trust and reputation based mechanisms for cip

12
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, 10-12 Febbraio 2014)

Upload: minya

Post on 23-Feb-2016

35 views

Category:

Documents


0 download

DESCRIPTION

Trust and Reputation Based mechanisms for CIP. Uniparthenope, UniRC, Polito. (Fai della Paganella, 10-12 Febbraio 2014). Objectives. To enhance the cyber security of Wireless Sensor Networks ( WSNs ) deployed to protect CIs by exploiting Trust and Reputation Model based techniques - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Trust and Reputation Based mechanisms for CIP

Trust and Reputation Based mechanisms for CIP

Uniparthenope, UniRC, Polito

(Fai della Paganella, 10-12 Febbraio 2014)

Page 2: Trust and Reputation Based mechanisms for CIP

Objectives

• To enhance the cyber security of Wireless Sensor Networks (WSNs) deployed to protect CIs by exploiting Trust and Reputation Model based techniques – Intrusion Tolerance at the routing level

Page 3: Trust and Reputation Based mechanisms for CIP

Security of WSNs

• WSNs have low computational resources and energy supply– Limit the number of exchanged messages– Limit the usage of cryptographic mechanisms

• WSNs are deployed in unattended, hostile, environments

Page 4: Trust and Reputation Based mechanisms for CIP

Trust and Reputation

A trust and reputation model is proposed to improve cyber defense. Say Node 3 wants to estimate trust and reputation perceived about Node 2:• Node 3 estimates a trust score of Node 2 through a direct measure

related to Node 2• Node 3 estimates a reputation score of Node 2 through indirect

measurements, e.g. by observing the trust level perceived by Node 1 wrt Node 2

Page 5: Trust and Reputation Based mechanisms for CIP

Attack Model: Sinkhole Attack

• Trust and reputation-based scores to ensure resilience against attacks such as sinkhole

No attack

Node 3 successfully attacks(BS = Base Station)

Page 6: Trust and Reputation Based mechanisms for CIP

Trust and Reputation Model

The model proposed acts as follows:1. When Node 3 starts an attack, by pretending to

have the best route toward destination, we need:1. A reliable way to check

if it is lying (to measure trust)2. A way to share this

information (to update neighbourns reputation)

(BS = Base Station)

Page 7: Trust and Reputation Based mechanisms for CIP

Test of Trustworthiness

Assuming to have a routing protocol enabling parties authentication 1. Node 4 forces a ping through two alternate paths one of

which includes the node under test2. Node 4 chooses the route with lower round trip time 3. If the selected path does not use the tested node as

gateway the trust level of node 3 is lowered – T43(t+1) = k* T43(t) k < 1

3

Page 8: Trust and Reputation Based mechanisms for CIP

Reputation

• If a change in the trust level of node 3 is going to occour, node 4 forwards a feedback to each of the nodes in its neightbour list.

• Each node receiving the feedback accordingly corrects the reputation of node 3– Ri3(t+1) = f(Ri3(t), ΔT43)

Page 9: Trust and Reputation Based mechanisms for CIP

Intrusion Tolerance

• When a node must select a parent to reach the BS this evaluation will be based on: quality of the channel, trust level, and reputation level of the candidate node.– That is a Dependability function is evaluated for

each candidate and the new parent will be the one with highest dependability value:• For each j in N: Dij(t+1) = f(Qij(t), Tij(t),Rij(t)) (N set of

neighbours)• The node j such that Dij(t+1) =Max(Dij(t+1)) is selected as

the parent one

Page 10: Trust and Reputation Based mechanisms for CIP

AODV Routing Protocol

• Ad hoc On Demand Distance Vector (AODV) is a standard routing protocol defined by RFC 3561 (http://www.ietf.org/rfc/rfc3561.txt)

• AODV is widely adopted e.g. in Bluetooth and Zigbee

http://www.bluetooth.com/

http://www.zigbee.org/

Page 11: Trust and Reputation Based mechanisms for CIP

Implementation

• A WSN was simulated through NS-3

• NS3 is a command-line, open source (GNU GPL v2) network simulator

• Programming languages: C++, Python• Different WSNs routing protocols are implemented

such as Optimized Link State Routing Protocol (OLSR) and Ad hoc On Demand Distance Vector (AODV)http://www.nsnam.org/

Page 12: Trust and Reputation Based mechanisms for CIP

Future Steps

• To complete implementation

• To test the effectiveness of the proposed model under different testbed configurations, and parameters tuning

• To extend the approach to manage other kind of attacks