Securing Wireless Sensor Networks

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security Issues In Sensor Networks By Priya Palanivelu.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
Key management in wireless sensor networks Kevin Wang.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Security in Sensor Networks
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Author: Hangyang Dai and Hongbing Xu
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Security of the Internet of Things: perspectives and challenges
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Future Internet: Sensor Networks Security Yongkoo Han.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Overview of Wireless Networks:
CMSC 414 Computer and Network Security Lecture 15
Intrusion Tolerance for NEST
Key Management Techniques in Wireless Sensor Networks
Introduction to Wireless Sensor Networks
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
SPINS: Security Protocols for Sensor Networks
Celia Li Computer Science and Engineering York University
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
SPINS: Security Protocols for Sensor Networks
Cross-layer Analysis for detecting Wireless Misbehavior
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University

Overview Overview of Wireless Sensor Networks (WSN). Security in wireless sensor networks. Why is it different? Our work on key pre-distribution in WSN Deployment-based scheme (INFOCOM’04) Pair-wise Scheme (ACM CCS’03) Summary.

Wireless Sensors Berkeley Motes

Mica Motes Mica Mote: Processor: 4Mhz Memory: 128KB Flash and 4KB RAM Radio: 916Mhz and 40Kbits/second. Transmission range: 100 Feet TinyOS operating System: small, open source and energy efficient.

Spec Motes

Wireless Sensor Networks (WSN) Sensors Deploy

Applications of WSN Battle ground surveillance Enemy movement (tanks, soldiers, etc) Environmental monitoring Habitat monitoring Forrest fire monitoring Hospital tracking systems Tracking patients, doctors, drug administrators.

Securing WSN Motivation: why security? Why not use existing security mechanisms? WSN features that affect security. Our work: Two key management schemes.

Why Security? Protecting confidentiality, integrity, and availability of the communications and computations Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission Sensor nodes can be physically captured or destroyed

Why Security is Different? Sensor Node Constraints Battery, CPU power, Memory. Networking Constraints and Features Wireless, Ad hoc, Unattended.

Sensor Node Constraints Battery Power Constraints Computational Energy Consumption Crypto algorithms Public key vs. Symmetric key Communications Energy Consumption Exchange of keys, certificates, etc. Per-message additions (padding, signatures, authentication tags)

Constraints (Cont.) Public Key Encryption Slow 1000 times slower than symmetric encryption Hardware is complicated Energy consumption is high Processor Energy Consumption (mJ/Kb) RSA/E/V RSA/D/S AES MIPS R4000 0.81 16.7 0.00115 MC68328 42 840 0.0130

Memory Constraints Program Storage and Working Memory Mica Motes: Embedded OS, security functions (Flash) Working memory (RAM) Mica Motes: 128KB Flash and 4KB RAM

Objectives of Our Research Long-term Goals Study how WSN’s constraints/features affect the design of security mechanisms. Develop security mechanisms for WSN. Current Projects Key Management Problems Data Fusion Assurance

Key Management Problem

Key Management Problem Sensors Deploy

Key Management Problem Sensors Deploy Secure Channels

Approaches Trusted-Server Schemes Public-Key Schemes Finding trusted servers is difficult. Public-Key Schemes Expensive and infeasible for sensors. Key Pre-distribution Schemes

Key Pre-distribution Loading Keys into sensor nodes prior to deployment Two nodes find a common key between them after deployment Challenges Memory/Energy efficiency Security: nodes can be compromised Scalability: new nodes might be added later

Naïve Solutions Master-Key Approach Pair-wise Key Approach Memory efficient, but low security. Needs Tamper-Resistant Hardware. Pair-wise Key Approach N-1 keys for each node (e.g. N=10,000). Security is perfect. Need a lot of memory and cannot add new nodes.

Eschenauer-Gligor Scheme Key Pool S Each node randomly selects m keys A B C D E When |S| = 10,000, m=75 Pr (two nodes have a common key) = 0.50

Establishing Secure Channels

Our Improvement Over Eschenauer-Gligor Scheme Appeared in IEEE INFOCOM 2004

Observations and Objectives F Property: Pr(A, B) = Pr(A, F) Our objective: Pr(A, B) >> Pr(A, F) Using deployment knowledge

Modeling Deployment Knowledge Deployment points for a group of sensors I A J F

Probability Distribution Function of Each Deployment Group

Key Pre-distribution Scheme Key Pools

Key Sharing Among Key Pools Horizontal a B C A b b a D a a F Vertical Diagonal b a b G H I b a

Local Connectivity

Network Resilience What is the damage when x nodes are compromised? These x nodes contain keys that are used by the good nodes. What percentage of communications can be affected?

Network Resilience

Key Pre-distribution Scheme A Pairwise Key Pre-distribution Scheme Appeared in CCS’03: ACM Conference on Computer and Communications Security

Objectives Pairwise key pre-distribution scheme. Our Approach: Each pair of sensor share a unique secret key Can be used for Authentication Our Approach: We use Blom Scheme to achieve Pairwise We use Random Key Selection scheme to improve performance and resilience

Blom Scheme Public matrix G Private matrix D (symmetric). +1 D +1 G N Let A = (D G)T A G = (D G)T G = GT DT G = GT D G = (A G)T

Blom Scheme A = (D G)T G (D G)T G i j Kij i N Kji j N +1 N X j N +1 N Node i carries: Node j carries:

-secure Property i k j Undesirable Situation: if u*G(i) + v*G(j) = G(k) then u*A(i) + v*A(j) = A(k) G +1 N AT =D G i k j

-secure Property ANY +1 columns in G are linear independent. Different from saying that G has rank +1 Rank: there exist +1 linear independent columns Can tolerate compromise up to  nodes. Once +1 nodes are compromised, the rest can be calculated if these +1 columns are linear independent. How to find such a matrix G?

Vandermonde Matrix G = 1 s s2 s3 sN (s2)2 (s3)2 (sN)2 s (s2) (s3)

Properties of Blom Scheme Blom’s Scheme Network size is N Any pair of nodes can directly find a secret key Tolerate compromise up to  nodes Need to store +2 keys Challenge: Can we increase  without increasing the storage usage.

Multiple Space Scheme Key-Space Pool  spaces (D1, G)  spaces Two nodes can find a pairwise key if they carry a common key space! (D, G)

How to select  and ? If the memory usage is m, the security threshold (probablistic) m is To improve the security, we need to increase /2. However, such an increase affects the connectivity.

Measure Local Connectivity plocal = the probability that two neighboring nodes can find a common key.

Plocal for different  and 

Security Analysis Network Resilience: When x nodes are compromised, how many other secure links are affected?

Resilience (p = 0.33, m=200) Blom

Resilience (p = 0.50, m =200) Blom

Improvement: Using Two-hop Neighbors = 7  = 2 = 31  = 2

Summary Security in WSN is quite different from traditional (Wired) network security. We have proposed two key pre-distribution schemes for WSN. Our schemes substantially improves the performance and network resilience.