34
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Embed Size (px)

Citation preview

Page 1: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Terminodes and Sybil:Public-key management in

MANET

Dave MacCallum

(Brendon Stanton)

Apr. 9, 2004

Page 2: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Outline

• The problem

• Terminodes project: proposed solution to public-key management problem

• Sybil attacks

• Sybil vs. Terminodes

• Thwarting Sybil?

Page 3: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

The problem

• Wireless ad hoc networks cannot depend on many of the resources available to traditional networks for security

• Such networks do not have the fixed infrastructure that is required for classical implementations of centralized certification authorities

• One option for solving this problem is to develop a self-organized system that completely sets aside the need for a trusted authority at any stage of implementation: Terminodes approach

Page 4: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Terminodes

Page 5: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 6: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 7: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 8: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 9: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 10: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 11: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 12: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 13: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 14: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 15: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 16: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 17: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 18: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004
Page 19: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Sybil attacks

• A Sybil attack is the forging of multiple identities for malicious intent -- having a set of faulty entities represented through a larger set of identities.

• The purpose of such an attack is to compromise a disproportionate share of a system.

• Result is overthrowing of any assumption of designed reliability based on a limited proportion of faulty entities.

Page 20: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Sybil: key idea

• Sybil Attack undermines assumed mapping between identity to entity and hence number of faulty entities

Page 21: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Model in Douceur(2002):

• Set E of entities e; two disjoint subsets C (c is correct) and F (f is faulty).

• Broadcast communication cloud, pipe connecting each entity to the cloud.

• Entities communicate by broadcast messages, all messages received within bounded time, not necessarily in order.

• Assume local entity l is correct.

Page 22: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

communication cloud

remote entities

local entity

Page 23: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

• Identity i is abstract representation of entity e which persists across multiple messages.

• 3 sources of info for which a local entity can accept identity i of remote e :– Trusted agency

– Itself

– Other entities

• Two ways to validate entities not received from trusted agency:– Direct validation

– Indirect validation; accept identities vouched for by already accepted identities

• Goal: accept all legitimate identities, but no counterfeits

Page 24: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

• Method: for direct and and indirect validation (not using trusted agency), utilize computational tasks to validate distinctness;– basically, validate distinctness of two entities by getting them to

perform some task (computational puzzle) that a single entity could not.

– cannot assume homogeneous resources, only minimum; faulty entity could have more than minimum

– practical impossibility of having challenges issued simultaneously.

– Result: for direct or indirect validation, a set of faulty entities can counterfeit an unbounded number of identities. (Douceur)

Page 25: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

• Validation which does not use a trust agency can’t provably meet the identity goal;– Identification based on local-only information not

practical – PGP-style web of (certification) trust not adequate; is

indirect-validation.

• Douceur’s Conclusion: A centralized authority is required to realize a reliable distributed system.

Page 26: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Douceur’s 4 Lemmas

1. If is the ratio of the resources of a faulty entity ƒ to the resources of a minimally capable entity, then ƒ can present g = distinct identities to local entity l.

2. If local entity l accepts entities that are not validated simultaneously, then a single faulty entity ƒ can present an arbitrarily large number of distinct identities to entity l.

Page 27: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Douceur’s 4 Lemmas (cont)3. If local entity l accepts any identity vouched for

by q accepted identities, then a set F of faulty entities can present an arbitrarily large number of distinct identities to l if either |F| q or the collective resources available to F at least equal those of q + |F| minimally capable entities.

4. If the correct entities in set C do not coordinate time intervals during which they accept identities, and if local entity l accepts any identity vouched for by q accepted identities, then even a minimally capable faulty entity f can present g = |C| / q distinct identities to l.

Page 28: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Sybil vs. Terminodes

• Despite their promises to the contrary, the Terminodes project is not immune to Sybil attacks

• This can be seen by looking at their repository construction algorithms

Page 29: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Maximum Degree Algorithm

• Each user stores in her local repository several directed and mutually disjoint paths of certificates.

• Each path begins at the user herself• The certificates are added to the path as follows: a

new certificate is chosen among the certificates connected to the last user on the path, such that the new certificate leads to the user that has the highest number of certificates connected to her

Page 30: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Shortcut Hunter Algorithm

• Certificates are stored into the local repositories based on the number of the shortcut certificates connected to the users

• A shortcut certificate is a certificate that, when removed from the graph makes the shortest path between two users previously connected by this certificate strictly larger than two

Page 31: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Thwarting Sybil• Do we believe any of this?

– Any flaws in the logic chain?– Is there another way to bind identities to entities?– Is there something about trust authorities that means

they must (by nature) be centralized?

• Is this really a problem? – Existing systems seem to be working fine.– What’s wrong with a distributed system using a

centralized trust authority?– Is a CA part of the distributed system that uses it?– Are existing practices good enough in practice?

Page 32: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

The Sybil Attack in Sensor Networks: Newsome, et al.

• Malicious node and its Sybils:– Direct vs indirect communication– Fabricated vs stolen identities– Simultaneous vs non-simultaneous attacks

Page 33: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Sybil attacks

• Distributed storage

• Routing

• Data aggregation

• Voting

• Resource allocation

• Misbehavior detection

Page 34: Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004

Defenses

• Old:– Computation– Storage– Communication

• New: direct attacks only– Radio resource testing– Random key predistribution– Registration– Position verification– Code attestation