11 Pugliese2008
11 Pugliese2008
853
be generated only if nodes have been authenticated Galois fields GF(q) [1] as driving mathematical
(key authentication); key authentication is based on the mechanism in a cryptographic scheme to be applied to
concept of "planned network topology" (Topology WSN node, is motivated by the following properties.
Authenticated Key, TAK). Now we will give the First, vector algebra offers more operators than
reasons for the introduction of Hybrid Cryptography ordinary scalar algebra (two kind of products between
and Topology Authenticated Key concepts in our vectors) and useful properties (for example the
proposal. With Hybrid Cryptography it is meant that property exploited for the proof of TAK Generation
benefits featuring both symmetric and asymmetric Theorem in Sec. 4). Second, the classical geometrical
cryptography [1] are exploited. It will be quantitatively interpretations of vector algebra over the real numbers
shown in Sec. 5 that this approach is compliant to field do not apply over finite fields; this occurrence
realistic security requirements for WSN: qualitatively makes harder any reverse engineering because no
speaking, limited resources (in terms of computational geometrical deductions can be exploited. Moreover the
power, available memory and short life cycle) would scalar product between vectors is a low complexity
suggest the adoption of symmetric cryptography but function with hashing properties because it returns a
the high exposure of sensor nodes to external attacks scalar in GF(q) from two vectors, i.e. 6 scalars, in
implies higher security requirements than ad-hoc or GF(q); this occurrence is important because TAK is
traditional networks and this would suggest the definitively a scalar product (see Sec. 4 eq. (4-4) and
adoption of asymmetric cryptography. Moreover our (4-5)) as well as the verification function g(.) defined
approach does not require any centralised certification in Sec. 3 and Sec. 4.2.
authority, as it is in normal asymmetric schemes. With
Topology Authenticated key it is meant that
cryptographic keys can be generated if and only if the
3. Description of the cryptographic
current network topology is compliant to a "planned scheme
network topology" or, using graphs, if and only if the
graph (a spanning tree is assumed for a WSN) According to the specific service requirements, the
representing the current network (the current net planner first identifies the appropriate network
graph) can be found in the graph representing the topology and then, with the support of a suited
"planned network topology" (the planned topology processing unit (server) generates a set of parameters,
graph). We qualitatively define "planned network we call Local Configuration Data (LCD), that will be
topology" (details in Sec. 4.2) the topology of a assigned to each node (Fig. 1). LCD includes:
network that has been planned by a service manager / • Private Key Component (Priv.Key.Comp.)
network designer (the "planner") in order to fulfil • Public Key Component (Pub.Key.Comp.)
specific service requirements. According to this • Local Planned Topology (Loc.Pld.Top.)
definition, the planned network automatically gets the Information is classified according to the following
attribute of "certified network topology" where the definitions:
certification authority is the planner. As an example, • Public: any information anyone can access
assume a new node is requesting to join the WSN at a (attackers included).
certain attachment node: if this request were accepted, • Restricted: any information any node in the
the resulting network topology would change: so, prior network can access.
to accept any attachment request and start key • Private: any information only a single node in
generation, the topology compliancy test (topology the network can access.
authentication) has to be performed first. The rationale
• Secret: any information only the planner can
for this approach comes out from the consideration that
access.
WSN nodes are highly exposed to physical capture
It is important to highlight that the share of
(more than nodes in traditional networks) by external
information capable to generate each pair-wise
attackers to be used as probes to intercept and
cryptographic key is classified as restricted / private
eventually inject malicious traffic into the network.
and the remainder information capable to generate all
Authentication at network topology level eliminates
possible pair-wise cryptographic keys as secret: this
this dangerous occurrence. Moreover in Sec. 4.2 will
approach in information management yields to
be shown that a "predefined topology" implied by a
maximisation of the entropy associated to the
"planned topology" mechanism is not actually a real
cryptographic scheme, as will be shown in Sec. 5. The
constraint on the flexibility and scalability of the
scheme exploits the impracticability in solving the
scheme. The adoption of vector algebra in extended
Discrete Logarithm Problem (DLP) [1], which a well-
854
known reverse engineering problem in GF(q). We put 3. The algorithmic complexity to crack (reverse
q =2 k
where k is an integer for which q =2 »
k
N engineering) TAK scheme is even greater respect
to a typical asymmetric scheme (Sec. 5).
holds and N is the total number of nodes in the
network. Let V be a vector space over GF(q) where the
generic vector !! E V is represented with a 3-pla
3.2 TAK vs. Symmetric Key Schemes
(u x,U Y, U z) of vector components elements in GF(q).
Comparing TAK mechanism to symmetric
Let f(.) a function satisfying the following schemes, we will show that:
requirements: 1. The scheme is perfect!y secure at single node
1. It must be a one-way function. level and at network level (Sec. 5.2 and Sec.
2. f(!!) * f(!!') = f(!!') * f(!!) :;t: 0 must hold for 5.3)
2. The cryptographic complexity to crack (reverse
V!!,!!' E V where * is an arbitrary
engineering) TAK scheme is comparable to that
commutative operator. of asymmetric schemes which is well greater
Let g(.) a function satisfying the following respect to symmetric schemes (Sec. 5.2);
requirements: 3. Key management is simple and comparable to
3. It must be a one-way function. symmetric schemes.
4. g(!!, !!') = 0 must hold only for
Priv.Key.Comp'j Priv'Key.com~'j
V!!,!!'E U c V, with U sub-space ofV. Pub.Key.Comp'j Pub.Key.Comp'j
According to Kerkhoffs Principle, the explicit
expressions for both f(.) and g(.) are public. Fig. 1 -~~al:;:~ .
reports the conceptual representation of the proposed
scheme. Node n j broadcasts the Pub.Key.Comp j .
Node n i receives it and starts the authentication
procedure and applies the verification function g(.) to
Loc.Pld.ToPi and Pub.Key.Comp j : if the result is zero
then node n j has been successfully authenticated by
node ni and KeYi can be generated. The same steps
are performed by node n j and, in case of successful
authentication, the Key j is generated. If f (.) is
compliant to the specified requirements (Sec. 3 n.l and Fig. 1 Conceptual representation of the
n.2), then KeYi and Key j are coincident (the key is proposed cryptographic scheme
symmetric) and define TAK. If the authentication fails,
an indication of possible threat is passed to the
implemented Intrusion Detection System.
855
4. Formal Apparatus Fixed ill, f, b and for V~i '~j E A, the following
properties hold:
1. Always TAK * o.
°
Building blocks of the proposed scheme are: This follows from the
1. Hybrid key cryptography condition!!!· ~i X~j)* assumed in (a);
2. Network topology authentication.
2. Elements in KL are always distinct, i.e. for
V~l,kl. E KL then k 1. xk 1. *0. This follows
4.1 Hybrid Key Cryptography
° assumed in (a);
J1 J 1
from !!!. ~i X ~ j) *
Let nodes ni and n j be a pair. The following 3. Elements in KT are always distinct, i.e. for
definitions are assumed: V~ti,ktj E KT then k ti xktj *0. This
a. Let A ~ V, M ~ V . Elements in A are defined
as follows: V~i'~j E Aif m· ~i X~j)* ° with proposition follows from !li x k 1J. * ° and
!ti IImX!li and ktj IImxk 1j (compare (4-1),
mE M an arbitrary fixed vector over GF(q);
(4-2) and (4-3));
b. Let bE B ~ GF(q) an arbitrary fixed (not a
generator) scalar in B: this information is secret;
4. For each node k 1 · ~t = °. The condition
~.(~x~)==O holds for V~. This implies that
c. Let ~ E C ~ V an arbitrary fixed vector over
GF(q): this information is secret; always k1 * kt .
k . = a.fla.)= a.kb!!!·~i
(4-1) - 11 -1 ~1 -1 with k = b!!!'~ Proof. The proof is straightforward: putting (4-1) into
{ (4-4) and exploiting the vector algebra property
~ti =~i X~i
~ . ~'x~,) == ~'.~ 'x~), then:
(4-2)
k = a .f~.)= a .kb!!!·~j
- 1j -J J -J with k = b!!!'~ ,
(4-7) TAK i =1!l '!tX
i
=
{ k =s·xa·
- tj -J -J = la.kb!!!·~i . \§J a. ~2 = b2!!!'~i Iks .. la. x a. 12
Is. x -J~
-1 -J @J -1~
where
m·a
s·
-1
= mf (a.) =mb--
- -1 -
i
Putting (4-2) into (4-5) and exploiting the property
(4-3) with k =1.
{ s· =mf(a.)=mb!!!·~j ~j ·Gi X~i)==~i ·~i X~j)' then:
-J - -J -
856
Putting (4-3) into (4-7) and (4-8), the result (4-6) is 2. Node n j ' on reception of kti verifies if
found and the thesis is shown. Q.E.D.
:3! j E cr(j) exists such that ! j . ! ti == 0 ; if yes then
4.2 Network Topology Authentication node n i has been successfully authenticated by
node nj'
The concept of "predefined topology" implied by a Fig. 2 reports the detailed representation of the
"planned topology" is not actually a real constraint on scheme.
the flexibility and scalability of the scheme. This
question is equivalent to count how many spanning
trees can be found in a given graph: if N are the nodes
5. Security Analysis
in the network and cr the average neighbours per node,
The following question is crucial: how much the
the Kirchhoff's (Matrix Tree) Theorem returns ~ cr N
proposed scheme is secure, i.e. how much difficult is to
compliant topologies. U sing the planned topology
crack the scheme. This question is split into the
graph, we identify the i-th node with its public key
following sub-questions:
component (! ti ) and the branch between the i-th node
and the neighbour j -th node with a vector Lover 1. Is TAK a real cryptographic key? I.e. which is the
entropy per binit associated to TAK?
GF(q) such that !i· !t. =
J
o. We denote L as a
2. How much a single node is secure? I.e. how much
Topology Vector for the i-th node. The compliancy complex is the inverse problem to break TAK
test between current and planned topology (security level in a single node)?
(authentication) is carried on through the verification 3. How much a network is secure? I.e. how many
function g(.) defined as the scalar product between !i nodes an attacker should compromise to break
TAK (security level in the network)?
and ! t.: this choice for g(.) is compliant to
J
requirements n. 3 and n.4 defined in Sec. 3. The The following sections answer to these questions.
condition g(!i '!t.) = L . !t. = 0 holds only if the link
J J
!i .! tj =0 exists, then n j belongs to the authentic net kti are public information and thus the related entropy
exists such that L .! t j == 0; if yes then node n j relationship between ~j and ~i is one-to-many as
has been successfully authenticated by node ni . !!!. ~i X~j) * 0 from Sec. 4 (a).
857
stated in Sec. 2, this operation is one-way function
from 6 scalars to 1 scalar. As ~tj is public known (it
has been shown that H(k t 0) == 0), then the information
- J
(5-1) on TAK is reduced to one third of the information
t o. Thus H(k
associated to -k J -1l" . -
kJ .!.
t 0) = 3 H(k
-1
o, k t .) :
1-J
1
(5-3) H TAK = H(~ Ii . ~ tj) = "3 H (~Ii ' ~ tj) =
Same considerations can be applied to and ~t j .
1
~li
= "3H(~Ii) == log2 q bit
3. H(~li) = H(~lj) == log2 q3 = 310g 2 q . where (5-2) has been considered. Q.E.D.
It will be shown that solving (5-1) for any possible
node pair in a network of N nodes, there are ~ q 3 free
5.2 Security level in a single node
solutions for ~li (the same holds for ~l j ) if N « q .
This security level is calculated by evaluating the
Suppose a node pair with node i and node j. The complexity to break the cryptographic key with a
equation system (5-1) is made of 6 equations (=3+3) single node available. In this case the complexity in
for node i in 10 variables (~, !!!, ~, b) and similarly reverse engineering !!!, ~, ~ and b from ~l' ~t and
for node j. The proof is given by inductive procedure: the (public) expression of f(.). Equations (5-4) show
solving (5-1) for node i, then ~ q 4 free solutions for that the relationship between ~l' ~t and!!!, f, ~ and
(~, !!!, f, b) are obtained and equivalently ~ q 3 free b is not simply a discrete logarithm, which is one of
most difficult problem in GF(q) algebra [1], but
solutions for ~li; solving (5-1) for any pair between
becomes more complex due to !!! and ~ appearing as
node i and any other node j with j =1,2,..., N, then
multiplying factors of the exponentiation and in the
~ q 3 - Nq free solutions for ~li are obtained: note exponent.
that the constraint ~i X~j *0 with j =1,2,..., N
implies that solutions with ~i parallel to ~j must be
eliminated, that is ~ Nq solutions for ~li are
eliminated. As N << q then there are still
5.3 Security level in the network
q3 _ Nq ~ q3 free choices for ~li. Applying the
definition for entropy, the thesis is proved. Same This security level is calculated by evaluating the
considerations can be applied to ~lj. Q.E.D. complexity to break the cryptographic key with all
nodes in the network available. The T-Security concept
is introduced.
Theorem (TAK Entropy). TAK entropy is
H TAK == log 2 q and TAK entropy per binit is == 1 bit.
Definition (T-Security). Given a network with N
nodes, a cryptographic key is T-Secure if an attacker
Proof. From the previous positions (1), (2) and (3), the should capture T + 1 < N nodes in the network to gain
following relationship is derived: enough information to crack the key.
(5-2) H(kIO,kto)
-1-J
= H(kto)+H(k
-J
o I kto) ==
-11 - J The best case is when T = N , because in this case
the cryptographic key never can be violated as there is
== H(~Ii) == 310g 2 q
no enough information shared in the network to do
that. This result can be achieved if a share of the
TAK is obtained from the scalar product between the information needed to generate cryptographic keys is
vectors ~li and ~tj (the same for ~lj and ~ti). As
858
external to the network (i.e. residing in an external processor MPR2400 @ 7.4 MHz), and assuming 10
server). clock cycles / operation, the cost in terms of
computation time for the calculation of a 128-bit TAK
Theorem (N-Security). TAK generation scheme is N- is estimated to be about -400 Jls. Supposing (0) ~ 4
secure (i.e. T = N ). neighbours per node (thus 4 Topology Vectors, 48
bytes each), plus the private and public TAK
Proof. The equation system (5-1) should be solved for components (48 bytes each), the cost in terms of
~, !!!, ~ and b to break TAK. According to the memory usage is estimated to be less than 300 bytes
definition of T-Security, a cryptographic scheme is N- per node.
secure if it cannot be broken even capturing all nodes
in the network. A similar proof given in Sec. 5.1 can be 7. Conclusions and Future Works
here applied. In case node i has been captured, solving
(5-1) gives ~ q 4 free solutions for (~, !}!, ~ , b). In A novel hybrid cryptographic scheme based on
case a further node, say node j with j = 2, has been pair-wise keys authenticated by the compliance to the
captured, the system equation (5-1) gives ~ q4 - q planned network topology has been proposed and its
effectiveness has been proved. According to the results
free solutions for (~, !}!, ~, b): note that the of the cost analysis reported in Sec. 6, the near term
constraint ~i x ~j ;t 0 implies that ~i cannot be plan consists in its implementation on a MicaZ cluster-
based sensor network.
parallel to ~j eliminating ~ q solutions for (~ , !}!, ~,
Future works foresee a cross-layer integration of
b). In case a further node, say node j with j = 3, has the cryptographic security with the Intrusion Detection
System proposed in [6] by the same authors jointly
been captured, solving (5-1) gives ~ q4 - 2q free
with University of Berkeley. An appealing application
solutions for (~, !}!, ~, b): note that the constraint scenario is bio-medics where WSN are deployed as
~i x ~j ;t 0 shall be applied twice (for nodes j with body area networks and a sink node is integrated into a
PDA: this is the case where security and reliability are
j = 2 and j =3) and ~ 2q solutions for (~, !}!, ~, b)
the absolute qualifying indicators for the effectiveness
shall be eliminated. When the last N-th node has been of the monitoring system.
captured, (5-1) gives ~q4 - Nq free solutions for (~,
4
!}!, ~, b). As N «q there are still ~ q free choices. 8. References
Q.E.D.
[1] A. J. Menezes, P. Van Oorschot, S. A. Vanstone
"Handbook of Applied Cryptography," CRC Press,
6. Cost Analysis 1996
[2] L. Eschenauer, V. D. Gligor, "A key management
The cost is measured in terms of computational scheme for distributed sensor networks," 9th ACM Conf
time and memory usage. The implementation of the on Computer and Communications Security, 2002
proposed cryptographic scheme relies on the following [3] H. Chan, A. Perrig, D. Song, "Random key pre-
distribution schemes for sensor networks," IEEE
processing facilities: an external server (supposed to be
Symposium on Security and Privacy, pages 197-213,
resource unlimited) which computes the set of LCD Berkeley, California, 2003
parameters assigned and loaded into the deployed [4] S. Zhu, S. Xu, S. Setia, S. Jajodia, "Establishing pair-
nodes, and the processing capability of each node wise keys for secure communication in ad hoc networks:
(supposed to be resource limited) needed to a probabilistic approach," 11 th IEEE International
authenticate the neighbour (local) network topology Conference on Network Protocols (ICNP'03), 2003
and to calculate TAK: actually its computationally [5] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar,
complexity is the square module of a scalar product "SPINS: Security protocols for sensor networks,"
MobiCom 2001, pp.189-199, 2001
between two vectors in GF(q), as it can be evaluated by
[6] M. Pugliese, A. Giani, and F. Santucci, "A Weak
the expression (4-4).
Process Approach to Anomaly Detection in Wireless
Suppose to apply the case q = 2 128 (i.e. 128 bit Sensor Networks," in First International Workshop on
keys): it can be show that (4-4) can be computed Sensor Networks (SN2008), 2008.
through - 300 16-bit operations (additions and
products). If MicaZ motes are employed (8-bit
859