SPINS: Security Protocols for Sensor Networks

Slides:



Advertisements
Similar presentations
Giuseppe Bianchi Lecture 6.1: Extras: Merkle Trees.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Security Issues In Sensor Networks By Priya Palanivelu.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
1 Sensor Networks Security and Privacy in Sensor Networks Haowen Chan and Adrian Perrig SPINS Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
SPINS: Security Protocols in Sensor Networks
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Security in Wireless Sensor Networks by Toni Farley.
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
By Prateek Arora Security for Sensor Networks By: Prateek Arora.
Security for Broadcast Network
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
Author: Na Ruan, Yoshiaki Hori Published in:
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Message Authentication Code
Symmetric Cryptography
WEP & WPA Mandy Kershishnik.
Packet Leashes: Defense Against Wormhole Attacks
SPINS: Security Protocols for Sensor Networks
CSCE 715: Network Systems Security
Intrusion Tolerance for NEST
Cryptography Basics and Symmetric Cryptography
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
BROADCAST AUTHENTICATION
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Security Of Wireless Sensor Networks
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
SPINS: Security Protocols for Sensor Networks
Lecture 10: Network Security.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Aggregation.
An Overview of Security Issues in Sensor Network
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

SPINS: Security Protocols for Sensor Networks Authors: Adrian Perrig, Robert Szewczyk, Victor Wen,David Culler and J.D.Tygar Presented By : Tanu Sharma (Some slides have been taken from authors’ sites)

Outline Security for sensor networks Proposed Techniques - Research Problem Proposed Techniques - SPINS building blocks Applications Related Work Discussion Conclusion

Sensor Networks are emerging Many applications - Real-time traffic monitoring - Military applications - Emergency and critical systems etc. Need secure communication protocols

Security for Sensor Networks Data Authentication Data Confidentiality Data Integrity Data Freshness - Weak Freshness - Partial message ordering, no delay information - Useful for sensor measurements - Strong Freshness - Total ordering on req-res pair, delay estimation - Useful for time synchronization

Challenge: Resource Constraints Limited energy Limited computation(4MHz 8-bit) Limited memory(512 bytes) Limited code size(8 Kbytes) Limited communication(30 byte packets) Energy consuming communication

Contributions SNEP -Sensor Network Encryption Protocol µTESLA -Secures point-to-point communication µTESLA -Micro Timed Efficient Stream Loss-tolerant Authentication -Provides broadcast authentication

System Assumptions Communication patterns -Node to base station (e.g. sensor readings) -Base station to node (e.g. specific requests) -Base station to all nodes Base Station -Sufficient memory, power -Shares secret key with each node Node -Limited resources, limited trust A B D E F G C Base Station

Notation A, B Principals( nodes) NA Nonce generated by A CA Counter generated by A χ AB Master secret key between A and B ( no direction information) KAB Secret encryption key between A and B (depends on direction) K’AB Secret MAC key between A and B {M}KAB Encryption of message M with KAB {M}<KAB,IV> Encryption of message M using key KAB and initialization vector IV MAC(K’AB,M) Message authentication code (MAC) of M

SNEP Data Confidentiality (Semantic Security ) Data Authentication Replay Protection Weak Freshness Low Communication Overhead

Key Generation /Setup Counter KeyEncryption RC5 Block Cipher KeyMAC Key Master Keyrandom Nodes and base station share a master key pre-deployment Other keys are bootstrapped from the master key: Encryption key Message Authentication code key Random number generator key

Authentication, Confidentiality Node B Node A M, MAC(K’AB, M) {M}<KAB, CA>, MAC(K’AB, CA|| {M}<KAB, CA>) Without encryption can have only authentication For encrypted messages, the counter is included in the MAC Base station keeps current counter for every node

Strong Freshness Nonce generated randomly Node B Node A Request, NA {Response}<KBA, CB), MAC(K’BA, NA || CB|| {Response}<KBA, CB>) Nonce generated randomly Sender includes Nonce with request Responder include nonce in MAC, but not in reply

Counter Exchange Protocol Bootstrapping counter values Node B Node A CA CB, MAC(K’BA, CA||CB) MAC(K’AB, CA||CB) To synchronize: A →B : NA B →A : CB, MAC(K’BA,NA || CB).

µTESLA : Authenticated Broadcast TESLA : efficient source authentication in multicast for wired networks. Problems with TESLA -Digital Signature for initial packet authentication µTESLA uses only symmetric mechanism -Overhead of 24 bytes per packet µTESLA discloses key once per epoch -One way key chain is too big µTESLA restricts number of authenticated senders

Key Setup Main idea: One-way key chains F(Kn) F(K2) F(K1) Kn Kn-1 K1 K0 ……. X Main idea: One-way key chains K0 is initial commitment to chain Base station gives K0 to all nodes

TESLA Quick Overview I Keys disclosed 2 time intervals after use Receiver knows authentic K3 Authentication of P1:MAC(K5,P1) F Authenticate K5 F K5 F K6 K3 K4 K5 K6 K7 t Time 4 Time 5 Time 6 Time 7 P1 P2 K5 Verify MAC K3

TESLA Quick Overview II Perfect robustness to packet loss F Authenticate K5 K3 K4 K5 K6 K7 t Time 4 Time 5 Time 6 Time 7 P1 K2 P2 K2 P3 K3 P4 K4 P5 K5 Verify MACs

TESLA Properties Asymmetry from delayed key disclosure Self-authenticating keys Requires loose time synchronization Low overhead (1 MAC) - Communication (same as SNEP) - Computation (~ 2 MAC computations) Independent of number of receivers

Applications Authenticated Routing Node to Node Agreement A B: NA, A B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B) S A: {SKAB}KSA , MAC(K’SA,NA || A || {SKAB}KSA ) S B: {SKAB}KSB , MAC(K’SB,NB || B || {SKAB}KSB )

Related Work in Broadcast Authentication Symmetric schemes - Link-state routing updates - Multi-MAC Asymmetric schemes - Merkle hash tree Chained hashes - EMSS Hybrid schemes -Stream signature -K-times signature

Discussion: Drawbacks The TESLA protocol lacks scalability - require initial key commitment with each nodes, which is very communication intensive SPINS uses source routing, so vulnerable to traffic analysis

Discussion: Risks Un-addressed Information leakage through covert channels No mechanism to determine and deal with compromised nodes. Denial of service attacks No Non-repudiation

Conclusion Strong security protocols affordable Low security overhead - First broadcast authentication Low security overhead - Computation, memory, communication Apply to future sensor networks -Energy limitations persist -Tendency to use minimal hardware Base protocol for more sophisticated security services