WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

By Md Emran Mazumder Ottawa University Student no:
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Wireless Sensor Network Security: A Survey Presented By: Anubhav Mathur Department of Computer Science University of Connecticut Authors: John Paul Walters,
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
WIRELESS SENSOR NETWORK Pair-Wise Key Establishment Presented By: Mohammed Saleh CS 599b Summer07.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
GROUP N Charles Barrasso Carter May Chih-Yu (Joey) Tang.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
1 Secure Ad-Hoc Network Eunjin Jung
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Maximizing Lifetime of Ad Hoc Networks/WSNs Using Dynamic Broadcast Scheme Guofeng Deng.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
An Adaptive Protocol for Efficient & Secure Multicasting in Wireless LANS Sandeep Gupta & Sriram Cherukuri Arizona State University
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Presented by Edith Ngai MPhil Term 3 Presentation
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Presented by: Saurav Kumar Bengani
Version B.00 H7076S Module 3 Slides
Distributed Algorithms for Mobile Sensor Networks
Distributed Algorithms for Mobile Sensor Networks
Intrusion Tolerance for NEST
Key Management Techniques in Wireless Sensor Networks
Security Issues in Wireless Sensor Networks
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Mobile ad hoc networking: imperatives and challenges
SPINS: Security Protocols for Sensor Networks
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Majid Alshammari and Khaled Elleithy
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Amar B. Patel , Shushan Zhao
SPINS: Security Protocols for Sensor Networks
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Optimizing Energy Consumption in Wireless Sensor
An Overview of Security Issues in Sensor Network
Konstantinos Georgantas, HIIT
Survey on Coverage Problems in Wireless Sensor Networks - 2
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06

WSN Background WSN Architecture WSN Security Issues and requirements Approach

Background 100/1000 nodes Low cost solution Limited resources Controlled or uncontrolled environment

WSN Architecture

WSN Architecture A sensor Nodes Consist of: Battery Memory Processor Radio links for communicating

Sensor Node Constraints Battery Power/ Energy Processor Rechargeability Sleep Patterns Memory

Network constraints Limited Pre-Configuration Unreliable communications Frequent Routing Changes

WSN Architecture

WSN Architecture

Security in Wireless Networks

Security Requirements Confidentiality Authenticity Integrity Freshness Scalability Availability Accessibility Self-Organization Flexibility

Security in Wireless Networks Attacks Poor physical protection Attacks not only from outside but also from within the network from compromised nodes.

WSN Attacks

Security in Wireless Networks Security concepts: Cryptography - Public/private key Diffie hellman

Group key protocol key establishment protocols can be classified into two categories: Group key management - Group key is usually created and updated by a central key server, and then securely distributed to all members. Tree-based key management - each node contributes a fraction of the group key and the creation and update of group key are the joint work of all members.

Group key management Proposed approach: We propose a security protocol that takes advantage of a group key management scheme for a hierarchical sensor network. Our scalable algorithm is based on modifying a classic security protocol by the modification to the multi party Diffie-Hellman protocol to accommodate sensor networks.

Group Key Mgmt

References SEYIT A. C¸AMTEPE and B¨ ULENT YENER, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. Technical Report TR-05-07 (March 23, 2005). David W. Carman, Peter S. Kruus, and Brian J.Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varshney. A Key Management Scheme for Wireless Sensor Networks Using DeploymentKnowledge. IEEE INFOCOM, 2004. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM conferenceon Computer and Communications security, Washington, DC, USA, November 18-22 2002. Biswajit Panja, Review Paper for PhD Research Readiness, Key Management for Secure Sensor Networks

References RSA Encryption Standard, Version 1.4. San Mateo, Ca.: RSA Data Security, Inc., 1991. W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), 644-654. Multicast Security: A Taxonomy and Efficient Constructions. IEEE Press, 1999. Ten Emerging Technologies That Will Change The World, Feb.2003. Mihaela Cardei My T. Thai Yingshu Li Weili Wu, Energy-Efficient Target Coverage in Wireless Sensor Networks, IEEE INFOCOM 2005. A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer 35(10):54–62, 2002. J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM Press, 2004. Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary Department of Computer Science Wayne State University5143 Cass Ave, MI 48202, USA

References J. Deng, R. Han, and S. Mishra. Countermeasuers against traffic analysis in wireless sensor networks. Tech. Rep. CU-CS-987-04, University of Colorado at Boulder, 2004. Peng Peng , P2P-HGKM: An Efficient Hierarchical Group Key Management Protocol for Mobile Ad-Hoc Networks, B.Sc., Peking University, 2000 Eric Ricardo Anton, Otto Carlos Muniz Bandeira Duarte, Group Key Establishment in Wireless Ad Hoc Networks , Workshop em Qualidade de Serviço e Mobilidade – 2002.