Trust and Security Issues and Solutions (Public)
Total Page:16
File Type:pdf, Size:1020Kb
Ref. Ares(2015)2268119 - 01/06/2015 317959 Mobile Opportunistic Traffic Offloading D4.3 – Trust and Security Issues and solutions (public) Grant Agreement No. 317959 Project acronym MOTO Project title Mobile Opportunistic Traffic Offloading Advantage Deliverable number D4.3 Deliverable name Trust and Security Issues and solutions Version V 1.0 Work package WP 4 – Offloading Protocols and Algorithms Lead beneficiary INNO Authors Oscar Lázaro (INNO), Patricia Ortiz (INNO), Iván Prada (INNO), Sebastien Tixeuil (UPMC), Marcelo Dias de Amorim (UPMC), Andrea Passarella (CNR), Giovanni Mainetto (CNR) Nature R – Report Dissemination level PU – Public Delivery date 31/05/2015 (M31) D4.3 – Trust and security issues and solutions WP 4 – Offloading Protocols and Algorithms Executive Summary Mobile Opportunistic networking presents a challenging environment from a security perspective. This is because they are more vulnerable to attacks than other networks due to the lack of a central trusted node, dynamic topology of the network and limited resources (bandwidth, processing power and energy consumption). In this sense, MOTO is not a pure opportunistic network as the MOTO platform acts as a central trusted entity and manages the network. Within this document, the main security considerations, addressed in the MOTO environment, are presented. The document provides the results of the research that has been carried out in Task 4.3, where the security framework has being designed within the project. Indeed, the research performed reveals that the most important security and privacy challenges identified for MOTO are: A. End-to-end integrity and confidentiality B. Trust management and hop-to-hop security C. Identity and location privacy D. User authentication E. Mitigating malicious insiders The trade-off between performance/efficiency of the network and security is also covered. Moreover, the first simulation results of the security performance are provided. Finally, the security implementation approach and planning is presented. © MOTO Consortium – 2015 2 D4.3 – Trust and security issues and solutions WP 4 – Offloading Protocols and Algorithms Table of Contents 1 OVERVIEW ..................................................................................................................................... 6 1.1 INTRODUCTION .................................................................................................................................... 6 1.2 SCOPE OF THIS DOCUMENT .................................................................................................................... 6 2 SECURITY CONTEXT IN MOTO ......................................................................................................... 8 2.1 CHALLENGES IN A HYBRID OPPORTUNISTIC NETWORK .................................................................................. 8 2.2 MOTO CONTEXT DESCRIPTION ............................................................................................................. 10 3 MAIN THREATS IN MOTO COMMUNICATIONS .............................................................................. 12 4 SECURITY GOALS IN MOTO ........................................................................................................... 18 5 THE PROPOSED SECURITY APPROACH ........................................................................................... 20 5.1 AUTHENTICATION ............................................................................................................................... 20 5.2 INTEGRITY AND CONFIDENTIALITY OF INFORMATION ................................................................................. 20 5.3 TRUSTWORTHINESS OF THE USERS ......................................................................................................... 21 5.4 USERS’ PRIVACY .................................................................................................................................. 21 5.5 OVERALL SECURITY APPROACH .............................................................................................................. 21 5.6 GENERAL DESCRIPTION: END-TO-END SECURITY ....................................................................................... 23 5.6.1 Multiple phase Cryptography ................................................................................................ 23 5.7 ANONYMITY THROUGH THE USE OF PSEUDONYMOUS ............................................................................... 26 5.8 TRUST & REPUTATION MANAGEMENT .................................................................................................... 32 5.8.1 Trust framework previous considerations ............................................................................ 32 5.8.2 Trust Feedback ...................................................................................................................... 37 5.8.3 Environmental Factor ............................................................................................................ 38 5.8.4 Computation of the trust value of a user .............................................................................. 39 5.9 OVERALL SECURITY APPROACH ALGORITHM ............................................................................................. 43 6 PRIVACY VS OFFLOADING PROTOCOLS: A CROSSROADS ................................................................ 46 7 INITIAL SIMULATION RESULTS ON SECURITY ................................................................................. 47 8 SECURITY IMPLEMENTATION PLAN ............................................................................................... 50 8.1 THEORETICAL SECURITY APPROACH ........................................................................................................ 50 8.2 MOTO DEMO SCENARIO ..................................................................................................................... 51 8.3 SECURITY IMPLEMENTATION FOR THE 1ST MOTO DEMO SCENARIO ............................................................. 52 8.4 PLANNING FOR THE SECURITY IMPLEMENTATION FOR THE 1ST MOTO DEMO SCENARIO .................................. 53 9 CONCLUSIONS AND FUTURE WORK .............................................................................................. 54 10 REFERENCES ................................................................................................................................. 55 © MOTO Consortium – 2015 3 D4.3 – Trust and security issues and solutions WP 4 – Offloading Protocols and Algorithms List of Figures Figure 1. MOTO Security Channels .................................................................................................................... 9 Figure 2. Content encryption with Content provider session key and key distribution (confidentiality) ....... 11 Figure 3. MOTO offloading strategy ................................................................................................................ 12 Figure 4. MOTO Architecture (D.2.1.1)............................................................................................................ 13 Figure 5. Seed misbehavior in erroneous content injection ........................................................................... 14 Figure 6. Relay misbehavior in erroneous content injection .......................................................................... 15 Figure 7. Selfish seed in a no content retransmission threat .......................................................................... 15 Figure 8. Selfish relay in a no content retransmission threat.......................................................................... 15 Figure 9. User identity disclosure threat in personal data disclosure ............................................................. 16 Figure 10. User location and tracking threat in personal data disclosure....................................................... 16 Figure 11. Monitoring of node activity threat in personal data disclosure ..................................................... 17 Figure 12.Security Objective: End-to-end content protection ........................................................................ 18 Figure 13. Security Objective: Strong Authentication Mechanisms ................................................................ 19 Figure 14. Security Objective: Availability in all cases ..................................................................................... 19 Figure 15.Security Objective: Contribution to the quality of the service) ...................................................... 20 Figure 16. Overall security approach proposed .............................................................................................. 22 Figure 17. Overall proposed security approach .............................................................................................. 23 Figure 18. Asymmetric cryptography approach to assure the origin and integrity of the content ................ 24 Figure 19. Confidentiality & Integrity encryption phases ................................................................................ 25 Figure 20. Overview of the multi-layer encryption proposed for MOTO communications ............................ 26 Figure 21. Pseudonym delivery to user 1 and user 2 in time 1 ....................................................................... 27 Figure 22. Use of pseudonym in a content offloading opportunity ...............................................................