WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06
WSN Background WSN Architecture WSN Security Issues and requirements Approach
Background 100/1000 nodes Low cost solution Limited resources Controlled or uncontrolled environment
WSN Architecture
WSN Architecture A sensor Nodes Consist of: Battery Memory Processor Radio links for communicating
Sensor Node Constraints Battery Power/ Energy Processor Rechargeability Sleep Patterns Memory
Network constraints Limited Pre-Configuration Unreliable communications Frequent Routing Changes
WSN Architecture
WSN Architecture
Security in Wireless Networks
Security Requirements Confidentiality Authenticity Integrity Freshness Scalability Availability Accessibility Self-Organization Flexibility
Security in Wireless Networks Attacks Poor physical protection Attacks not only from outside but also from within the network from compromised nodes.
WSN Attacks
Security in Wireless Networks Security concepts: Cryptography - Public/private key Diffie hellman
Group key protocol key establishment protocols can be classified into two categories: Group key management - Group key is usually created and updated by a central key server, and then securely distributed to all members. Tree-based key management - each node contributes a fraction of the group key and the creation and update of group key are the joint work of all members.
Group key management Proposed approach: We propose a security protocol that takes advantage of a group key management scheme for a hierarchical sensor network. Our scalable algorithm is based on modifying a classic security protocol by the modification to the multi party Diffie-Hellman protocol to accommodate sensor networks.
Group Key Mgmt
References SEYIT A. C¸AMTEPE and B¨ ULENT YENER, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. Technical Report TR-05-07 (March 23, 2005). David W. Carman, Peter S. Kruus, and Brian J.Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varshney. A Key Management Scheme for Wireless Sensor Networks Using DeploymentKnowledge. IEEE INFOCOM, 2004. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM conferenceon Computer and Communications security, Washington, DC, USA, November 18-22 2002. Biswajit Panja, Review Paper for PhD Research Readiness, Key Management for Secure Sensor Networks
References RSA Encryption Standard, Version 1.4. San Mateo, Ca.: RSA Data Security, Inc., 1991. W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), 644-654. Multicast Security: A Taxonomy and Efficient Constructions. IEEE Press, 1999. Ten Emerging Technologies That Will Change The World, Feb.2003. Mihaela Cardei My T. Thai Yingshu Li Weili Wu, Energy-Efficient Target Coverage in Wireless Sensor Networks, IEEE INFOCOM 2005. A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer 35(10):54–62, 2002. J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM Press, 2004. Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary Department of Computer Science Wayne State University5143 Cass Ave, MI 48202, USA
References J. Deng, R. Han, and S. Mishra. Countermeasuers against traffic analysis in wireless sensor networks. Tech. Rep. CU-CS-987-04, University of Colorado at Boulder, 2004. Peng Peng , P2P-HGKM: An Efficient Hierarchical Group Key Management Protocol for Mobile Ad-Hoc Networks, B.Sc., Peking University, 2000 Eric Ricardo Anton, Otto Carlos Muniz Bandeira Duarte, Group Key Establishment in Wireless Ad Hoc Networks , Workshop em Qualidade de Serviço e Mobilidade – 2002.