The field relates generally to communication networks, and more particularly to alarm condition processing in such communication networks.
With the proliferation of distributed communication networks wherein network elements are distributed over a large geographic area, protection of the network elements from tampering and intrusion is important to owners of the data stored on or passing through such network elements.
One approach is to incorporate an intrusion alarm mechanism in a network element whereby the alarm is triggered when the physical housing (e.g., case, crate, equipment rack, etc.) of the network element is opened or otherwise compromised. However, when external power to the housing is cut by a person or system seeking to tamper with the network element and its data (i.e., intruder), the intrusion alarm will not be activated. Simple contact alarms (e.g., door switches) have also been offered in network elements but are largely ineffective in deterring intruders.
Further, simple tamper-evident mechanisms including color-changing tamper-evident tapes or seals are known to be used on network elements. However, these implementations are not flexible and do not allow resets without attending to the device, e.g., re-applying the tape or the seal.
Another approach includes the secure electronic retention of alarm condition data in a tamper-resistant environment so as to prevent an intruder from clearing any alarm condition indications by simply deleting the alarm condition data. The tamper-resistant environment is implemented in hardware but is limited in terms of its storage capacity as well as its complexity/price.
Embodiments of the invention provide techniques for alarm condition processing in communication networks.
In one embodiment, a method comprises the following steps. An alarm condition associated with a network element of a communication network is detected. Alarm indication data is generated based on the alarm condition detected. The alarm indication data is protected using a cryptographic key to generate protected alarm indication data. The protected alarm indication data is stored in a non-volatile memory.
Advantageously, illustrative embodiments of the invention provide cryptographic techniques for preserving alarm condition data in a tamper-evident and resettable manner so as to prevent intruders from tampering with network elements in a communication network.
These and other features and advantages of the present invention will become more apparent from the accompanying drawings and the following detailed description.
Embodiments of the invention will be described herein in the context of illustrative architectures associated with network elements and communication networks. However, it is to be understood that embodiments of the invention are not limited to the illustrative network element and communication network architectures shown. Rather, embodiments of the invention are more generally applicable to any network element and communication network in which it would be desirable to provide techniques for processing and securely storing alarm conditions.
As used herein, the phrase “network element” refers to any computing device associated with a communication network. By way of example only, such computing device may be a router, a switch, a base station, a mobile terminal, etc. Embodiments of the invention are not limited to any particular type of network element.
As will be illustratively explained herein, embodiments of the invention provide cryptographic methods to store alarm indication data of a network element in a tamper-evident and resettable manner. In one or more embodiments, alarm indication data may comprise one or more of alarm condition indicators, alarm metadata, and auxiliary data associated with an alarm condition.
As used herein, the phase “alarm condition indicator” refers to a record of a certain alarm condition, for example, a binary value indicative of whether a case of a given network element has been opened (e.g., one of a logic “1” or logic “0”) or has remained closed (e.g., the other of a logic “1” or logic “0”) over a given time period.
Further, as used herein, the phrase “alarm metadata” refers to a set of data stored in addition to the alarm condition indicator. For example, the alarm metadata may comprise a voltage reading or temperature reading corresponding to a certain alarm condition.
Still further, as used herein, the phrase “auxiliary data” refers to set of data corresponding to one or more recorded alarm conditions, for example, photographs, sound or video recordings which are taken prior, during or directly after the alarm condition.
As mentioned above, existing methods to ensure the secure retention of alarm condition indicators, alarm metadata, and the auxiliary data associated with an alarm condition include recording these data elements in a tamper resistant environment (TRE). However, it is realized that the TRE is implemented in hardware and is limiting from the point of view of its storage capacity as well as its complexity/price.
It is currently known how to protect data during its transmission over an insecure channel, where eavesdropping, unauthorized data manipulation (change and injection), and replay can happen. However, existing storage approaches do not known how to adequately protect data from similar eavesdropping, unauthorized manipulation (change and injection), and replay which can happen during the storage of the data in an insecure environment.
Embodiments of the invention address these and other issues associated with the secure storage of alarm indication data in network elements. In one embodiment, the secure storage of alarm indication data can be characterized as a delayed transmission (e.g., store and forward) of that alarm indication data to the same entity which generated the alarm indication data. While it is important to preserve the alarm condition data and protect it from tampering (tamper resistance), such environment may prove to be rather expensive. It is thus realized that a suitable approach that balances cost and complexity with security would be to create a tamper-evident environment.
Examples of intrusion sensors 118 include, but are not limited to, one or more of physical intrusion detectors (e.g., door switches, other activation switches, etc.) and electronic intrusion detectors (e.g., software that detects network hacking activities, etc.). Examples of acceleration sensors 120 include, but are not limited to, detectors that sense and/or record movement of the network element 100. Examples of environmental sensors 122 include, but are not limited to, sensors operable to measure voltage levels and/or temperature levels within the network element 100 in order to aid in the analysis of an alarm condition.
In general, the set of alarm sensors 116 generate alarm indication data when an alarm condition is detected by one or more of the sensors that comprise the set. The generated alarm indication data is provided to the alarm storage and processing unit 112 for processing and storage in accordance with embodiments of the invention.
The alarm storage and processing unit 112 is operable to store alarm indication data in non-volatile memory. The non-volatile memory may comprise actual non-volatile memory (NVM), for example, flash memory or EEPROM, or may comprise RAM utilizing a backup battery. The backup power source 114 in network element 100 ensures that the data stored in unit 112 is preserved even if power is cut to the network element (i.e., acts as nonvolatile memory).
Network element 100 also comprises tamper-resistant environment (TRE) 110 which is operable to store a cryptographic key (secure alarm key) and store secure boot procedures for the network element 100, as will be explained below in the context of
Before storage of this alarm condition indicator in unit 112, the value is integrity protected in unit 112 by encrypting the value using a secret cryptographic key Ka to generate protected value (Alarm_Status)Ka. The key is stored in TRE 110. The alarm condition indicator value may also be replay protected and/or confidentiality protected before being stored in unit 112.
In step 204, upon triggering of an alarm condition (i.e., an alarm condition is detected by one or more of the set of sensors 116), for example, a case intrusion, the alarm storage and processing unit 12 (possibly now being powered by the backup power source 114 depending on the alarm condition type) receives the alarm indication data from the set of sensors 116. This means that the unit 112 receives the Alarm_Status value set to logic “1” indicating an alarm has been detected. The unit 112 then integrity protects the value using secret cryptographic key Ka, as explained above, to generate protected value (Alarm_Status)Ka. Again, the alarm condition indicator value may also be replay protected and/or confidentiality protected before being stored in unit 112. Thus, the unit 112 processes any alarm indication data it receives and stores it in non-volatile memory.
In step 206, at a subsequent power up cycle of the network element 100, the network element goes through a secure boot-up validation procedure (secure boot process), during which the stored protected alarm indication data is analyzed for integrity attacks, and possibly for replay and confidentiality attacks if such protection was implemented. This may include decrypting the data using the secret cryptographic key Ka (which as mentioned above is stored in TRE 110).
More specifically, in one embodiment, the secure boot process analyzes an integrity (and possibly replay and/or confidentiality, if instituted) protection status of the Alarm_Status variable. For example, the alarm condition indicator value being analyzed is compared against a securely stored (e.g., in TRE 110) reference alarm condition indicator value. If these two values are the same, upon successful check, then it is assumed that there was no tampering with the data. However, if the values are different, then the network element assumes that the data has been tampered with. Note that if the reference value remains constant, the attacker can substitute (replay) the alarm condition indicator value with the expected (constant) value. To protect against such a replay attack, the expected reference value may be changed at every successful check or reset (e.g., by adding freshness based on time, etc. to the reference value and alarm condition indicator value computations).
If any security breach of the alarm indication data due to tampering is evident (integrity or replay/confidentiality protection is compromised, as explained above), the methodology moves from step 206 to step 212. In step 212, the network element 100 decides whether to: (1) enable a limping mode (step 216), wherein the device is allowed minimal functionality, for example, connection to its service center; or (2) if the alarm or security violation is too serious, shut down the network element (step 214).
If the security of the stored alarms has not been compromised in step 206, that is, the integrity and replay/confidentiality status are considered fine (ok), the secure boot process, in step 208, analyzes the alarm status variable Alarm_Status, i.e., monitors current alarm conditions. If an alarm condition is detected, the methodology goes back to step 212 and makes the shut down (step 214) or limping mode (step 216) decision. If, however, no new alarm condition is detected, then the network element 100 proceeds to normal operation (dependent on what the function of the network element is, e.g., routing, switching, etc.).
Accordingly, it is to be understood that the ability of methodology 200 to detect an alarm condition is its tamper-evident property. After the methodology 200 goes into the shut down (step 214) or limping mode (step 216), the network element or user can contact the communication network in which it is deployed or its operator to either report or clear (reset) the detected alarm condition. Alternatively, the detected alarm condition may be reset based on a timer or any other programmable event.
Lastly,
As shown in network 300, computing devices 302-1, 302-2, 302-3, . . . , 302-P are operatively coupled via communication network media 304. The network media can include any network media across which the computing devices are capable of communicating including, for example, a wireless medium and/or a wired medium. By way of example, the network media can carry IP (Internet Protocol) packets end to end (from one computing device to another). However, embodiments of the invention are not limited to any particular type of network medium.
It is to be understood that one or more of the computing devices 302 shown in
As would be readily apparent to one of ordinary skill in the art, the computing devices in
Nonetheless,
It should be understood that the term “processor” as used herein is intended to include one or more processing devices, including a signal processor, a microprocessor, a microcontroller, an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other type of processing circuitry, as well as portions or combinations of such circuitry elements. Also, the term “memory” as used herein is intended to include electronic memory associated with a processor, such as random access memory (RAM), read-only memory (ROM), non-volatile memory (NVM), or other types of memory, in any combination. Further, the phrase “network interface” as used herein is intended to include any circuitry or devices used to interface the computing device with the network and other network components. Such circuitry may comprise conventional transceivers of a type well known in the art.
Accordingly, software instructions or code for performing the methodologies and protocols described herein may be stored in one or more of the associated memory devices, e.g., ROM, fixed or removable memory, and, when ready to be utilized, loaded into RAM and executed by the processor. That is, each computing device shown in
Although illustrative embodiments of the invention have been described herein with reference to the accompanying drawings, it is to be understood that embodiments of the invention are not limited to those precise embodiments, and that various other changes and modifications may be made by one skilled in the art without departing from the scope or spirit of the invention.