Top Banner
LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings 20082065 Myunghan Yoo August 2, 2008
22

LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Dec 18, 2015

Download

Documents

Gregory Craig
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

LOGO

A Public Key Cryptographic Method for Denial of Service Mitigation in

Wireless Sensor Networks

O. Arazi, H. Qi, D. RoseIEEE SECON 2007 proceedings

20082065Myunghan YooAugust 2, 2008

Page 2: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Progress

Problem & background

Solution

Discussion

Page 3: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Public Key Cryptography

Use private and public keys Given public key, easy to compute -> anyone can lock Only those who has private key compute its inverse

-> only those who has it can unlock, vice versa.

P DE() D()

Key

Attacker

P

KeKd

C P

C=E(P, Ke) P=D(C, Kd )

Insecure channel

Key

Page 4: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

For Privacy

- Encrypt M with Bob’s public key : C = eK(Bp,M)

- Decrypt C with Bob’s private key : D = dK(Bs,C)

* Anybody can generate C, but only Bob can recover C to M.

Usage of PKC (I)

ek( , ) M

BP

dk( , ) C

M

BS

Public directory

Alice : Ap

Bob : Bp

Chaum : Cp

. .

Page 5: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Usage of PKC (II)

dk( , ) M

As

ek( , ) C M

Ap

Alice : Ap

Bob : Bp

Chaum : Cp

. .

Public directory

- Encrypt M with Alice’s private key : C = dK(As,M)

- Decrypt C with Alice’s public key : D = eK(Ap,C)

* Only Alice can generate C, but anybody can verify C.

For authentication (Digital Signature)

Page 6: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Motivation & Objective

Public Key Cryptography (PKC)

Denial-of-Service Attack in PKC With repeated & meaningless requests to

normal nodes to establish a session key, the adversary causes attacked normal nodes to waste energy resources

Pros Cons

Resilience High computational overhead

Scalability Weak against DoS attacks

Decentralized key management

Page 7: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Objective & Key Idea

Objective Mitigating Denial-of-Service (DoS) attacks

Key Idea Loading heavy computational burden

on the instigator

Page 8: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Progress

Problem & background

Solution

Discussion

Page 9: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Overview of Proposed Scheme

Stage A:Alice proving her validity to Bob

A relatively energy draining procedure on Alice’s part

Stage B:Bob proving her validity to AliceA relatively low energy draining

procedure on Bob’s part

If successful

If successful: both users hold an ephemeral shared secret key

Page 10: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

The Instigator Proving Its Validity

Alice Bob

nA

IDA

CRA

(CRA)e mod nCA = H(nA, IDA) If so, generates a message, m, such that: t= me mod nA

ttdA mod nA = m

x: LSB of message m

compares

nA: Alice’s public key, IDA: Alice’s public key ID, CRA: Alice’s certificate signed by CA with its private key,e, nCA : CA’s public key

CRA = [H(nA, IDA)]dca mod nCA

H(nA, IDA) = nA IDA⊕

512 bits or 1024 bits

Page 11: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Message m

x: Significant bits to identify the instigator

y and z: Factors of an ephemeral key

z212bits

y200bits

x100bits

Example of message m where the length of m is 512 bits.

Page 12: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Overview of Proposed Scheme

Stage A:Alice proving her validity to Bob

A relatively energy draining procedure on Alice’s part

Stage B:Bob proving her validity to AliceA relatively low energy draining

procedure on Bob’s part

If successful

If successful: both users hold an ephemeral shared secret key

Page 13: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

The Approached Node Proving Its Valid-ity

Key Transport

Elliptic Curve Digital Signature Algorithm (ECDSA)

Self-Certified DH Fixed Key-Generation

Page 14: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Key Transport

Alice Bob

Stage A

If successful

nB, CRB, IDB, SB

Validation of the values: (CRB)e mod nCA = H(nB, IDB),

(SB)e mod nB = y

If successful

KAB-final = z

Stage B:

SB = ydB mod nB

Page 15: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

ECDSA

Alice Bob

Stage A

If successful

(C, L)

Calculates h = L-1,

q1 = y · h mod ordG, q2 = C · h mod ordG,

P = q1 · G + q2 · V, and C’ is scalar of P

If C’ = C

KAB-final = z

Stage B:

V = u · GC is scalar of VL = u-1(y + dB · C) mod ordG

Page 16: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Self-Certified DH Fixed Key-Generation

Stage A

If successful

Self-Certified DH Fixed Key-GenerationKAB-temp = KAB (generated by Alice) = nA x [H(IDB, nB) x nB + nCA] = KBA (generated by Bob) = nB x [H(IDA, NA) x nA + nCA]Stage B:

KAB-final = H(KAB-temp, m’)

nB, CRB, IDB

Alice Bob

Page 17: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Implementation Results

Time (msec) Energy (J) Total

Alice Bob Alice Bob Time Energy

Stage A 230 1.02 105.8 0.469 231.02 106.27

Stage B

Key Transport 2.04 230 0.938 105.8 232.04 106.738

ECDSA 100 50 46.32 23.16 150 69.48

Fixed Key 50 50 23.16 23.16 100 46.32

Time (m-sec)

Energy (mJ)

Total consumption Both stages Both stages

Key Transport 463.06 213.01

ECDSA 381.02 175.75

Fixed Key 331.02 152.6Using 1024-Bit RSA and 160-bit ECC on the Intel MOTE

2 Platform from 312 MHz core clock

Page 18: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Progress

Problem & background

Solution

Discussion

Page 19: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Contribution

This paper may be the first try of DoS at-tack mitigation for PKC

Page 20: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Discussion

Unclear environment of implementation communication distance between Alice and

Bob

Yet, unsuitable PKC in the WSN

Incoherent logic Applying to only a suspicious node is needed

DoS attack with incomplete stage A

Page 21: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

DoS attack with incomplete stage A

Alice Bob

nA

IDA

CRA

(CRA)e mod nCA = H(nA, IDA) If so, generates a message, m, such that: t= me mod nA

ttdA mod nA = m

x: LSB of message m

compares

nA: Alice’s public key, IDA: Alice’s public key ID, CRA: Alice’s certificate signed by CA with its private key,e, nCA : CA’s public key

CRA = [H(nA, IDA)]dca mod nCA

H(nA, IDA) = nA IDA⊕

512 bits or 1024 bits

Completed part

Incompleted part

Page 22: LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

THANK YOUQ&A