Presented by Meghana Ananth Gad and Archita Pathak

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

1`` ```` ```` ```` ```` ```` ```` ```` ```` ```` `` AEGIS A Fast Authenticated Encryption Algorithm Hongjun Wu Bart Preneel Nanyang Technological University.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Wired Equivalent Privacy (WEP)
Information Security and Management 11
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Cryptography, Authentication and Digital Signatures
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Lecture 23 Symmetric Encryption
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Presentation Road Map 1 Authenticated Encryption 2 Message Authentication Code (MAC) 3 Authencryption and its Application Objective Modes of Operation.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Block Cipher Encrypting a large message Electronic Code Book (ECB) message m1 m2 m3 m4 m5 m6 c1 c2 c3 c4 c5 c6 E E E Secret.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Message Authentication Code
Modes of Operation.
Computer and Network Security
CSE 4905 IPsec.
TinySec: Security for TinyOS
CSCE 715: Network Systems Security
Public Key Encryption and Digital Signatures
Towards End-to-End Data Protection in Low-Powered Networks
Authenticated encryption
Final Project, , 2016 Kyle Kotowick
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Cryptography Lecture 12.
AES Mode Choices OCB vs. Counter Mode with CBC-MAC
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
SPINS: Security Protocols for Sensor Networks
Cryptography Lecture 10.
Block cipher and modes of encryptions
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Cryptography Lecture 11.
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Security Of Wireless Sensor Networks
Block vs Stream Ciphers
SPINS: Security Protocols for Sensor Networks
SOFTWARE IMPLEMENTATION OF OCB MODE
Block Ciphers (Crypto 2)
Security of Wireless Sensor Networks
Cryptography Lecture 11.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Lecture 4.1: Hash Functions, and Message Authentication Codes
Cryptography Lecture 10.
Cryptography Lecture 9.
Cryptography Lecture 11.
Cryptography Lecture 10.
Security Attacks, Mechanisms, and Services
July 15, 2019 doc.: IEEE r0 May, 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES.
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
CRYPTOGRAPHY & NETWORK SECURITY
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
IT4833/6833 WiFi Security Building Blocks (I).
Secret-Key Encryption
Presentation transcript:

Presented by Meghana Ananth Gad and Archita Pathak BSN-Care : A Secure IoT-Based Modern Healthcare System Using Body Sensor Network Prosanta Gope and Tzonelih Hwang Presented by Meghana Ananth Gad and Archita Pathak

What is BSN-Care? A secure IoT based healthcare system using BSN (Body Sensor Network) The components of IoT and BSN have the ability to collect and transfer data over network with requiring any assistance. BSN-Care addresses the security concerns associated with transmission of sensitive (life-critical) data over the network.

Why do we need BSN-Care? A recent report from the United Nations [2] predicted that there will be 2 billion (22% of the world population) older people by 2050. 89% of these elderly people are expected to live independently. Medical research surveys suggest that 80% of people older than 65 suffers from at least one chronic disease.

Related Work and Motivation Alarm-net – heterogeneous network architecture (consisting of body sensor and environment sensor networks) designed at University of Virginia. Median – patient monitoring system designed at Johns Hopkins University.

Components of BSN-Care

Example of action table using BP data

Security requirements in IoT based healthcare system using BSN Data Privacy Data Integrity Data Freshness Authentication Anonymity Secure Localization

Enforcement of security in BSN-Care System Network Security – Lightweight Anonymous Authentication Protocol Data Security – OCB authenticated encryption mode

Phase 1 – Registration

Phase 2 – Lightweight anonymous authentication protocol

Data Security in BSN-Care Authenticated encryption scheme called OCB OCB stands for offset codebook. OCB is a block-cipher mode of operation. It can be used with any block-cipher. But the obvious choice is AES. In simple terms, for most message blocks, one offsets the block, applies the block cipher, and then offsets the result once again.

Features of OCB OCB is fully parallelizable. OCB makes a nearly optimal number of block-cipher calls: |M|/n + 2. OCB avoids the need for a random IV (a nonce is enough). OCB can encrypt messages of any bit length. Messages don't have to be a multiple of the block length, and no separate padding regime is needed. OCB is nearly endian-neutral: the scheme can be implemented just as fast on a big-endian machine or a little-endian machine

Generic Composition Alternative This approach has been around forever, and it is versatile and clean. Using separated keys, you should encrypt the plaintext and then MAC the resulting ciphertext. OCB needs only (n+1) encryption to support both privacy and integrity. Also OCB ensures the freshness of the received data using an incremental interface, which provides a new incremental value like a counter (through an incrementing function).

Security Analysis SR1: Accomplishment of the Mutual Authentication SR2: Accomplishment of the Anonymity SR3: Accomplishment of the Secure Localization SR4: Resistance to Replay and Forgery Attacks SR5: Accomplishment of the Data Security

SR1: Accomplishment of the Mutual Authentication The BSN-Care server authenticates the LPU by verifying the one-time- alias identity AIDL , the track sequence number TrSeq, and the parameter V1 in the request message of MA1 , where only a legitimate LPU can form a valid request message MA1 . In case of loss of synchronization the shadow identity sid along with parameters V1 and V2 can be used for mutual authentication.

SR2: Accomplishment of the Anonymity In the proposed scheme, both the shadow identity with the emergency key pair and one-time-alias identity with track sequence number ensure anonymity and untraceability. The shadow-ID and emergency key pairs are used only in situations of de-synchronization. All the parameters in the request message MA1 will be unique in every iteration making it difficult for an eavesdropper to identify the source of the message.

SR3: Accomplishment of the Secure Localization In real-time applications, a lack of smart tracking approach may allow an attacker to send the incorrect location by using false signals. When the BSN-Care server wants to know the patient location, then it will use the encoded location area identity i.e. EL, then computes LAI = EL ⊕ h(Kls ||Nl ). The sever then requests the base station for LAI and compares it with the value of LAI in EL.

SR4: Resistance to Replay and Forgery Attacks In the proposed model, none of the parameters in the request message MA1 can be sent twice. Hence, if the attacker tries to intercept and resend the same request message, then by using the most recent track sequence number or a valid shadow identity, the server can easily detect it. In case of the response message MA2, the value of the parameter V2 will not be equal to the h(Tr||Kls ||I DL ||Nl ).

SR5: Accomplishment of the Data Security OCB based data encryption can satisfy all the three properties of the data security, where any alternation of data and any replay attempt by an adversary can easily be detected using tag, which is unforgeable.

Performance Analysis and Comparison

Performance Analysis and Comparison Alarm-net uses the AES-CBC encryption mode and CBC-MAC in order to ensure data privacy and the data integrity, respectively. It is still unknown how the Median checks the authenticity of the received data and which crypto-system has been used for data confidentiality Data D, divided into n blocks, OCB based data security approach needs |D|/n + 1 block cipher calls Whereas for the same purpose AES-CBC encryption and CBC-MAC, used in Alarm-net requires 2 * |D|/n + 1 and 2 * |D|/n + 4 block cipher calls

Performance Analysis and Comparison

References P. Gope and T. Hwang, ``BSN-care: A secure IoT-based modern healthcare system using body sensor network,'' IEEE Sensors J., vol. 16, no. 5, pp. 1368-1376, Mar. 2016. http://web.cs.ucdavis.edu/~rogaway/ocb/ocb-back.htm#what-is-ocb