Security Of Wireless Sensor Networks

Slides:



Advertisements
Similar presentations
TinySec: Security for TinyOS C. Karlof, N. Sastry, D. Wagner November 20, 2002.
Advertisements

Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TinySec: Security for TinyOS Chris Karlof Naveen Sastry David Wagner January 15, 2003
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam.
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry, David Wagner Presented by Paul Ruggieri.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Lecture 23 Symmetric Encryption
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Network Security David Lazăr.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Security in WSN Vinod Kulathumani West Virginia University.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Lecture 23 Symmetric Encryption
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Message Authentication Code
Security Outline Encryption Algorithms Authentication Protocols
Symmetric Cryptography
Home: Tel: , H.P.: Office: 공) 7710A
Advanced Computer Networks
TinySec: Security for TinyOS
CSCE 715: Network Systems Security
Presented by: Dr. Munam Ali Shah
Block Cipher Modes CS 465 Make a chart for the mode comparisons
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Cryptography Basics and Symmetric Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Algorithm Types & Algorithm Modes
csci5233 computer security & integrity (Chap. 4)
Symmetric-Key Encryption
Block vs Stream Ciphers
Security of Wireless Sensor Networks
Cryptography Lecture 12.
Topic 13: Message Authentication Code
SPINS: Security Protocols for Sensor Networks
Cryptography Lecture 11.
CRYPTOGRAPHY & NETWORK SECURITY
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

Security Of Wireless Sensor Networks

Learning Objectives Understand the security threats faced by WSNs Understand the security primitives used in WSNs Understand TinySec

Prerequisites Module 2 Basic concepts of network security Basic concepts of computer networks

Security Risks in Wireless Sensory Networks Eavesdropping Confidentiality Packet Injection Access control Integrity Jamming Replay Denial of Service K K TinySec K Fix the picture K Adversary

Security Goals Access Control Message Integrity Confidentiality Link layer protocol should prevent unauthorized parties from participating in the network Message Integrity Receiver should be able to detect the malicious modification of transmitted messages Confidentiality Keep transmitted messages secret from unauthorized parties Replay Protection Attacker can replay a legitimate message at some later time

Security Goals Performance Ease of use Using cryptography will incur increased overhead in extra demands on the processor and RAM Increased message length decreases the throughput and increased latency. It will also increase the power consumption Ease of use Higher level security protocols will rely on the link-layer security as a primitive Transparent to applications

Security Primitives Message Authentication Codes (MACs) A common solution to achieve authenticity and integrity MAC can be viewed as “Cryptographically secure checksum” Generated with a key shared by both sender and receiver Difficult to forge without the key Initialization Vectors (IV) To achieve semantic security An input to the algorithm to add variation to the encryption process

Block Ciphers Pseudorandom permutation (invertible) DES, RC5, Skipjack, AES Maps n bits of plaintext to n bits of ciphertext Used to build encryption schemes and message authentication codes (MAC)

Mode of Operation Block ciphers operate on blocks of plaintext and ciphertext For example 64 bits A cryptographic mode combines the basic ciphers, some sort of feedback, and some simple operations Example Block Cipher modes ECB, CBC, CFB, CTR, OFB

Cipher Block Chaining (CBC) Mode The results of the encryption of previous blocks are fed back into the encryption of the current block.

Two Security Options - TinySec Authenticated Encryption (TinySec-AE) Data payload encrypted Packets authenticated with a MAC MAC computed over the encrypted data and the packet header Authentication Only (TinySec-Auth) Data payload is not encrypted

Encryption - TinySec TinySec IV format Encryption schemes Tradeoff between long and short IV How long is long enough? The structure of IV is dst||AM||l||src||ctr Encryption schemes Stream cipher has a devastating failure mode: if the same IV is ever used, it is often possible to recover both plaintext Block cipher is preferred It is as robust as possible in the presence of repeated IV MAC algorithms use a block cipher

Packet Format - TinySec

Keying Mechanisms - TinySec Determines how cryptographic keys are distributed and shared throughout the network Mechanisms A single network-wide TinySec key among the authorized nodes Nodes share a key for communication only if they need to communicate with each other (pair-wise) Neighboring nodes to share a TinySec key

Assignment 1. Please list five attack scenarios for wireless sensor networks 2. How does TinySec provide “Authenticated encryption” and “Authentication only” mechanisms? 3. What is a block cipher?