key management techniques for group communications in … · key management techniques for group...

1
Key Management Techniques for Group Communications in MANETs Maria Striki, John S. Baras Problem Specification Objective: Construct Secure, Efficient, Robust & Scalable Key Management Schemes in MANETs, for Secure Group Comm/tions Secure: enables/protects data exchange (it reaches all intended recipients, and only they must “read” it) Efficient: overhead caused by security (Comm/tion, Computation, Storage, Delay Costs) low as possible Robust: handles the dynamics of the network Scalable: handles successfully a large number of nodes Key Management Secure, efficient, scalable Group Communications for MANETs Application: Secure Routing for MANETs Application: Secure the WEP of MAC for MANETs Bootstrapping Key Generation Entity Authentication Key Distribution Steady State Operations Leader Election Problem Specification: Roadmap for Group & Key Establishment & for Group Security Maintenance in a MANET 1 2 3 4 11 12 15 16 17 1 2 3 4 11 12 15 16 17 CA1 CA2 certificate certificate MAC address MAC address Squad 054 Squad054 Discover members Authenticate Build Group ? 1 2 3 4 11 12 15 16 17 1 2 3 4 5 6 8 9 11 12 15 16 17 1 2 3 4 5 6 7 8 9 11 12 15 16 17 1 2 3 4 5 6 7 8 9 11 12 15 16 17 1 2 3 4 5 6 7 8 9 11 12 15 16 17 1 2 3 4 5 6 7 8 9 11 12 14 15 16 17 1 2 3 4 5 6 7 8 9 11 12 13 14 15 16 17 1 2 3 4 5 6 7 8 9 11 12 13 14 15 16 17 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 CA1 CA2 certificate certificate MAC address MAC address Squad 054 Squad054 Discover members Authenticate Build Group ? Group Formation Operations: Bootstrapping, Key Generation-Distribution, Entity Authentication Steady State Operations: Re-Keying, Re-authentication, Privileges Update/ Revocation Focus on the Design of Suitable for MANETs Techniques for Group Formation and Steady State Operations. Emphasis on Incorporation of Entity Authentication to Key Generation/ Distribution B D A C P1 P2 P3 P4 P6 P5 P7 B D A C P1 P2 P3 P4 P6 P5 P7 Flexibility: Select Key Generation/Distribution Subgroup Protocols Freely Independence of Subgroups: Different Key Generation Protocols May Be Applied to Each Subgroup Localization: Subgroups Deployed in a Relatively Restricted Network Area Adaptability: No Restrictions on Subgroup Size subject to Network Topology Efficiency: Less Comm/tion OH & Bandwidth Consumption per Subgroup Robustness: Faulty Subgroup Leaders Tolerated or Replaced Dynamically Table 1: Evaluation and Comparison of Octopus based protocols: (O), (MO) and (MOT) Initial Com m unication vs. Group Size, d=6 (log. Scale) 1.00E+06 1.00E+07 1.00E+08 1.00E+09 1.00E+10 2000 6000 10000 14000 18000 22000 26000 30000 Group Size (n) (O) (MO) (MOT) (OFT) Addition Communication vs. Group Size , d=3 1.00E+03 1.00E+06 2.00E+06 3.00E+06 4.00E+06 5.00E+06 6.00E+06 7.00E+06 8.00E+06 9.00E+06 2000 6000 10000 14000 18000 22000 26000 30000 Group Size (n) (O) (MO) (MOT) (OFT) Results Step I: Comparative Performance Evaluation of Key Generation for protocols OFT, MO, MOT & original Octopus Overall GSCs Addition Computation vs. Group Size, d=4 (log. Scale) 1.00E+10 1.00E+13 1.00E+16 2000 6000 10000 14000 18000 22000 26000 30000 Group Size (n) (O) (MO) (MOT) (OFT) Overall GSCs Initiall Computation vs. Group Size, d=6 (log. Scale) 1.00E+12 1.00E+13 1.00E+14 1.00E+15 1.00E+16 1.00E+17 2000 6000 10000 14000 18000 22000 26000 30000 Group Size (n) (O) (MO) (MOT) (OFT) Step II: Step II: Comparative Performance Evaluation of Key Generation with Entity Authentication incorporation for protocols OFT, MO, MOT & original Octopus Figure 1: MO is by far the worst. MOT along with (O) are the winners, followed closely by OFT Figure 2: MO & (O) are by far the worst. MOT reduces overhead to almost half in regard to OFT Figure 3: OFT is by far the worst. MOT has the best performance as far as Initial Comm/tion, then MO Figure 4: (O) is by far the worst. MOT is the winner for addition computation, MO and OFT behave similarly. Same graph for deletion when d=4 Figure1: Initial Communication vs. Group size, d=6 for authenticated O and MOT, compared to OFT. O and MOT achieve almost the same lowest cost Figure2: GSC comp. cost of authenticated (O), MOT, O. Despite the two added services, MOT still performs best CONCLUSIONS – FUTURE WORK Original 2 d -Octopus (O): Breaks a Large Group into 2 d Smaller Subgroups, Requires Three Steps: 1. Subgroup Key Establishment by means of a Centralized Scheme 2. Group Key Establishment from Partial Subgroup Keys via Hypercube 3. Each Subgroup Leader Communicates Group Key to All its Members Key Generation-Distribution Approach: Octopus Based Protocols GDH.2 based 2 d -Octopus (MO): Maintains 2 nd Step Intact, Substitutes the Centralized Scheme of the 1 st & 3 d Step with GDH.2. The M n Member of GDH.2 becomes Subgroup Leader for MO Subgroup Key Becomes: TGDH based 2 d -Octopus (MOT): Maintains 2 nd Step Intact, Substitutes the Centralized Scheme of the 1 st & 3 d Step with TGDH. The sponsor of TGDH becomes Subgroup Leader for MOT Subgroup Key Becomes: ab z N a a = x y N a a = Wire-line On-line and known Trusted Entities because: Stable infrastructure Infinite power Effects: Two unknown nodes can trust each other anytime through Trusted Entities MANETs Trusted Entities are not available at all times because: Not stable infrastructure Dynamic changes in the network Effects Unknown nodes do not have access on demand to Trusted Entities Establishment of trust between them is a difficult task Example I (on-line Trusted Entities vs. off-line Trusted Entities) Motivation Advantages Entity Authentication Approaches for MANETs Modification of Lamport Hash for Entity Authentication/Re-Authentication Original Lamport: Simple Password Protocol for Wire-Line Network, Prevents Eavesdropping, Impersonation, Replay Attacks. No Mutual Authentication Our Modification: Suitable in MANETs, Eliminate Man-In-the-Middle Attack: STEP 1: Authenticated DH key Exchange at Bootstrapping, Obtain Secret Key, use it to Exchange Initial Quantities <n,xn>. STEP K (>1): Apply Original Lamport Modified Merkle Trees (MMT) for (Re)Authentication, Privileges Update/ Revocation Assumption: Hierarchical Structure. Group Divided to Subgroups. MMT Applied per Subgroup and a per Subgroup CA Generated How it works: Member i Creates Secret Share m i from 2-Party DH Exchange with Leader. Leader Hashes these Values, and Sends Back to Node logN Values B C D E F G H 000 001 011 010 100 101 110 111 A GSC GSC M3 M2 secret n 2 : g n1 , g n2 , g n1 n2 s e c r e t n 3 : g n 1 n 2 n 3 , g n 1 n 2 , g n 1 n 3 , g n 2 n 3 secret n N- 1 : g n2.. n N - 1 , g n1. . ni - 1 ni +1… nN - 1 , .., g n1… n N -1 MN secret n N : g n2.. nN ,.., g n1.. ni - 1 ni +1.. nN M1 sec ret n 1 : g n1 Group Key: g n1…nN M1 M2 M5 M6 M3 M4 x’=a r1 y’=a r2 p’=a r5 q’=a r6 x y p q z’=a z z=a r1 r2 w’=a r3 v’=a r4 w v = TGDH + GDH.2 + GKMP + Hypercube Octopus – Based protocols: MO, MOT Original Octopus Continue Design & Develop Efficient, Robust & Scalable Algorithms for Key Generation-Distribution, Entity Authentication, Steady State Operations of Key Management (KM) Develop Analytical Mobility Models from Realistic Mobility Patterns, Incorporate them in KM, Evaluate Effect of Mobility on KM Schemes Implementation of KM in Linux Platforms, to be Tested Over AODV

Upload: phamnhan

Post on 12-Mar-2019

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Key Management Techniques for Group Communications in … · Key Management Techniques for Group Communications in MANETs ... P5 P7 P1 Flexibility ... Subgroup Key Establishment by

Key Management Techniquesfor Group Communications in MANETs

Maria Striki, John S. Baras

Problem SpecificationObjective: Construct Secure, Efficient, Robust & Scalable Key Management Schemes in MANETs, for Secure Group Comm/tions

Secure: enables/protects data exchange (it reaches all intended recipients, and only they must “read” it)Efficient: overhead caused by security (Comm/tion, Computation,

Storage, Delay Costs) low as possibleRobust: handles the dynamics of the networkScalable: handles successfully a large number of nodes

Key Management

Secure, efficient, scalable Group Communications for MANETs

Application:Secure Routing for MANETs

Application:Secure the

WEP of MAC for MANETs

Bootstrapping Key Generation

Entity Authentication

Key Distribution

Steady State Operations

Leader Election

Problem Specification: Roadmap for Group & Key Establishment & for Group Security Maintenance in a MANET

1

2

34

5

6

7

8

910

11

1213

14

w12

w23

w35

w4,16

16

17

w45

w2,16

w49 w9,10

w9,11

w11,12

w11,14

w13,14

w14,15

w12,13

w13,17

w12,16

w16,17

w67

w68w56

1

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

17CA1

CA2 certificate

certificate

MAC address

MAC address

Squad 054

Squad054 Discover membersAuthenticate

Build Group

?

1

2

34

5

6

7

8

910

11

1213

14

w12

w23

w35

w4,16

16

17

w45

w2,16

w49 w9,10

w9,11

w11,12

w11,14

w13,14

w14,15

w12,13

w13,17

w12,16

w16,17

w67

w68w56

1

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

171

2

34

5

6

7

8

910

11

1213

1415

16

17CA1

CA2 certificate

certificate

MAC address

MAC address

Squad 054

Squad054 Discover membersAuthenticate

Build Group

?

Group Formation Operations: Bootstrapping, Key Generation-Distribution, Entity AuthenticationSteady State Operations: Re-Keying, Re-authentication, Privileges Update/

Revocation

Focus on the Design of Suitable for MANETs Techniques for Group Formation and Steady State Operations. Emphasis on Incorporation of Entity Authentication to Key Generation/ Distribution

B D

A C

P1

P2P3

P4

P6

P5

P7

B D

A C

P1

P2P3

P4

P6

P5

P7

Flexibility: Select Key Generation/Distribution Subgroup Protocols FreelyIndependence of Subgroups: Different Key Generation Protocols May Be

Applied to Each Subgroup Localization: Subgroups Deployed in a Relatively Restricted Network AreaAdaptability: No Restrictions on Subgroup Size subject to Network TopologyEfficiency: Less Comm/tion OH & Bandwidth Consumption per SubgroupRobustness: Faulty Subgroup Leaders Tolerated or Replaced Dynamically

Table 1: Evaluation and Comparison of Octopus based protocols: (O), (MO) and (MOT)

In it ia l C o m m u n ica t io n vs . G r o u p S iz e , d =6 ( lo g . S c a le )

1 .0 0E+0 6

1 .0 0E+0 7

1 .0 0E+0 8

1 .0 0E+0 9

1 .0 0E+1 0

2000

6000

10000

14000

18000

22000

26000

30000

Gr o u p S iz e (n )

(O )

(MO)

(MOT)

(O FT)

Addition Communication vs. Group Size , d=3

1.00E+031.00E+062.00E+063.00E+064.00E+065.00E+066.00E+067.00E+068.00E+069.00E+06

2000

6000

10000

14000

18000

22000

26000

30000

Group Size (n)

(O)(MO)(MOT)(OFT)

ResultsStep I: Comparative Performance Evaluation of Key Generation for protocols OFT, MO, MOT & original OctopusStep I: Comparative Performance Evaluation of Key Generation for protocols OFT, MO, MOT & original Octopus

Overall GSCs Addition Computation vs. Group Size, d=4 (log. Scale)

1.00E+10

1.00E+13

1.00E+16

2000

6000

1000

014

000

1800

022

000

2600

030

000

Group Size (n)

(O)(MO)(MOT)(OFT)

Overall GSCs Initiall Computation vs. Group Size, d=6 (log. Scale)

1.00E+12

1.00E+13

1.00E+14

1.00E+15

1.00E+16

1.00E+17

2000

6000

1000

014

000

1800

022

000

2600

030

000

Group Size (n)

(O)(MO)(MOT)(OFT)

Step II: Comparative Performance Evaluation of Key Generation with Entity Authentication incorporation for protocols OFT, MO, MOT & original Octopus

Step II: Comparative Performance Evaluation of Key Generation with Entity Authentication incorporation for protocols OFT, MO, MOT & original Octopus

Figure 1: MO is by far the worst. MOT along with (O) are the winners, followed closely by OFT

Figure 2: MO & (O) are by far the worst. MOT reduces overhead to almost half in regard to OFT

Figure 3: OFT is by far the worst. MOT has the best performance as far as Initial Comm/tion, then MO

Figure 4: (O) is by far the worst. MOT is the winner for addition computation, MO and OFT behave similarly. Same graph for deletion when d=4

Figure1: Initial Communication vs. Group size, d=6 for authenticated O and MOT, compared to OFT.

O and MOT achieve almost the same lowest cost

Figure2: GSC comp. cost of authenticated (O), MOT, O. Despite the two added services, MOT still performs best

CONCLUSIONS – FUTURE WORKCONCLUSIONS – FUTURE WORK

Original 2d-Octopus (O): Breaks a Large Group into 2d Smaller Subgroups, Requires Three Steps:

1. Subgroup Key Establishment by means of a Centralized Scheme 2. Group Key Establishment from Partial Subgroup Keys via Hypercube3. Each Subgroup Leader Communicates Group Key to All its Members

Key Generation-Distribution Approach: Octopus Based ProtocolsKey Generation-Distribution Approach: Octopus Based Protocols

GDH.2 based 2d-Octopus (MO): Maintains 2nd Step Intact, Substitutes the Centralized Scheme of the 1st & 3d Step with GDH.2. The Mn Member of GDH.2 becomes Subgroup Leader for MO Subgroup Key Becomes:

TGDH based 2d-Octopus (MOT): Maintains 2nd Step Intact, Substitutes the Centralized Scheme of the 1st & 3d Step with TGDH. The sponsor of TGDH becomes Subgroup Leader for MOT Subgroup Key Becomes:

ab z Na a=

x y Na a=

Wire-line

On-line and known Trusted Entities because:

Stable infrastructure

Infinite power

Effects:

Two unknown nodes can trust each other anytime through Trusted Entities

MANETs

Trusted Entities are not available at all times because:

Not stable infrastructure

Dynamic changes in the network

Effects

Unknown nodes do not have access on demand to Trusted Entities

Establishment of trust between them is a difficult task

Example I (on-line Trusted Entities vs. off-line Trusted Entities)Example I (on-line Trusted Entities vs. off-line Trusted Entities)

Motivation

AdvantagesAdvantages

Entity Authentication Approaches for MANETsEntity Authentication Approaches for MANETsModification of Lamport Hash for Entity Authentication/Re-Authentication

Original Lamport: Simple Password Protocol for Wire-Line Network, Prevents Eavesdropping, Impersonation, Replay Attacks. No Mutual AuthenticationOur Modification: Suitable in MANETs, Eliminate Man-In-the-Middle Attack:

STEP 1: Authenticated DH key Exchange at Bootstrapping, Obtain Secret Key, use it to Exchange Initial Quantities <n,xn>.

STEP K (>1): Apply Original Lamport

Modified Merkle Trees (MMT) for (Re)Authentication, Privileges Update/ RevocationAssumption: Hierarchical Structure. Group Divided to Subgroups. MMT Applied per Subgroup and a per Subgroup CA GeneratedHow it works: Member i Creates Secret Share mi from 2-Party DH Exchange with Leader. Leader Hashes these Values, and Sends Back to Node logN Values

B

CD

E F

GH

000 001

011 010

10 0 101

110111

A

GSCGSC

M3M2

secret n2: gn1, gn2, gn1 n2

secret n3: gn1 n2 n3, gn1 n2,gn1 n3,gn2 n3

secret n N-1: gn2..nN-1 ,

gn1..ni-1 ni+1… nN-1 ,..,

gn1… nN-1

MN

secret

n N: gn

2.. nN ,..,

gn1.. ni

-1ni+

1.. nN

M1secret n1: gn1

Group Key: gn1…nN

M1 M2 M5 M6

M3 M4

x’=ar1 y’=ar2 p’=ar5 q’=ar6

x y p q

z’=az

z=ar1 r2

w’=ar3 v’=ar4

w v

=TGDH +

GDH.2+ GKMP

+

Hypercube

Octopus – Based protocols: MO, MOT

Original Octopus

Continue Design & Develop Efficient, Robust & Scalable Algorithms for Key Generation-Distribution, Entity Authentication, Steady State Operations of Key Management (KM)

Develop Analytical Mobility Models from Realistic Mobility Patterns, Incorporate them in KM, Evaluate Effect of Mobility on KM Schemes

Implementation of KM in Linux Platforms, to be Tested Over AODV