Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-030-95085-9_7guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV

Published: 10 December 2021 Publication History

Abstract

Side Channel Attacks (SCAs) was first introduced by Paul Kocher in 1996 to break the secret key of cryptographic algorithms using the inherent property of the implementation along with the mathematical structure of the cipher. These categories of attacks become more robust as they do not require any mathematical cryptanalysis to retrieve the key. Instead, they exploit the timing measurements, power consumption, leaked electromagnetic radiation of the software/hardware platforms to execute key-dependent operations for the cipher. This, in turn, aids the adversary to gather some additional information about the computation. The overall concept of leaking secrets through side channel has been extended for Wireless Sensor Networks (WSNs) that implements Secret Sharing (SS) Scheme to exchange secrets between two nodes across multiple paths. Now in the idealized network model, it is assumed that for such SS schemes, all the paths between the two communicating nodes are atomic and have the same propagation delay. However, in the real implementation of TCP/IP networks, the shares propagate through every link and switch sequentially. Hence the attacker can probe any number of paths or switches to get the residual shares from previous messages that still exist in the network even when a new message is being sent. This kind of side channel vulnerability is known as Network Data Remanence (NDR) attacks. In this paper, we specifically target two SS schemes named Secure Protocol for Reliable Data Delivery (SPREAD) and Hybrid-Secure Protocol for Reliable Data Delivery (H-SPREAD), and an on-demand routing protocol named Path Hopping Based on Reverse AODV (PHR-AODV) to launch NDR based side channel attacks on the WSNs. We then show two specific categories of NDR attacks; a) NDR Blind and b) NDR Planned on the schemes mentioned above. We use an in-house C++ library to simulate our proposed attacks, and the experimental results reveal that the impact of NDR Blind attacks is negligible for these schemes, whereas the probability of data recovery for NDR Planned attacker proportionally increases with the path length.

References

[1]
Kocher PC Koblitz N Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems Advances in Cryptology — CRYPTO ’96 1996 Heidelberg Springer 104-113
[2]
Rivest RL, Shamir A, and Adleman LM A method for obtaining digital signatures and public-key cryptosystems (reprint) Commun. ACM 1983 26 1 96-99
[3]
Diffie W and Hellman ME New directions in cryptography IEEE Trans. Inf. Theory 1976 22 6 644-654
[4]
Kocher P, Jaffe J, and Jun B Wiener M Differential power analysis Advances in Cryptology — CRYPTO’ 99 1999 Heidelberg Springer 388-397
[5]
Lou W and Kwon Y H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks IEEE Trans. Veh. Technol. 2006 55 4 1320-1330
[6]
Rashidi, L., et al.: More than a fair share: network data remanence attacks against secret sharing-based schemes. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, 21–25 February 2021. The Internet Society (2021). https://www.ndsssymposium.org/ndss-paper/more-than-a-fair-share-network-data-remanence-attacks-against-secret-sharing-based-schemes/
[7]
Safavi-Naini, R., Poostindouz, A., Lisý, V.: Path hopping: an MTD strategy for quantum-safe communication. In: Okhravi, H., Ou, X. (eds.) Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, 30 October 2017, pp. 111–114. ACM (2017).
[8]
Lou, W., Liu, W., Fang, Y.: SPREAD: enhancing data confidentiality in mobile ad hoc networks. In: Proceedings IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, 7–11 March 2004, pp. 2404–2413. IEEE (2004).
[9]
Talipov E, Jin D, Jung J, Ha I, Choi YJ, and Kim C Kim Y-T and Takano M Path hopping based on reverse AODV for security Management of Convergence Networks and Services 2006 Heidelberg Springer 574-577
[10]
Lou, W., Fang, Y.: A multipath routing approach for secure data delivery. In: 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), vol. 2, pp. 1467–1473 (2001).
[11]
Jafarian JH, Al-Shaer E, and Duan Q Crampton J, Jajodia S, and Mayes K Formal approach for route agility against persistent attackers Computer Security – ESORICS 2013 2013 Heidelberg Springer 237-254
[12]
Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, 14–16 October 2013, pp. 260–268. IEEE (2013).
[13]
Zhang, L., et al.: Path hopping based SDN network defense technology. In: 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2016, Changsha, China, 13–15 August 2016, pp. 2058–2063. IEEE (2016).
[14]
Shamir A How to share a secret Commun. ACM 1979 22 11 612-613
[15]
Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge, pp. 313–313. IEEE Computer Society (1979)
[16]
Stinson DR An explication of secret sharing schemes Des. Codes Cryptogr. 1992 2 4 357-390
[17]
Bhandari R Survivable Networks: Algorithms for Diverse Routing 1999 Heidelberg Springer

Cited By

View all
  • (2022)Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call LogSecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-031-22829-2_11(185-203)Online publication date: 9-Dec-2022

Index Terms

  1. Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings
        Dec 2021
        264 pages
        ISBN:978-3-030-95084-2
        DOI:10.1007/978-3-030-95085-9

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 10 December 2021

        Author Tags

        1. Side channel attack
        2. Network data remanence
        3. Secret sharing scheme
        4. Wireless sensor networks

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call LogSecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-031-22829-2_11(185-203)Online publication date: 9-Dec-2022

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media