Security and Sensor Networks By Andrew Malone and Bryan Absher.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Key Infection (smart trust for smart dust) Ross Anderson (Cambridge) Haowen Chan (CMU) Adrian Perrig (CMU)
Sensor network Routing protocol A study on LEACH protocol and how to improve it.
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Pursuit Evasion Games (PEGs) Using a Sensor Network Luca Schenato, Bruno Sinopoli Robotics and Intelligent Machines Laboratory UC Berkeley
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Key management in wireless sensor networks Kevin Wang.
A Node-Centric Load Balancing Algorithm for Wireless Sensor Networks Hui Dai, Richar Han Department of Computer Science University of Colorado at Boulder.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Aggregation in Sensor Networks
Wireless Ad-Hoc Networks
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Chapter 6 Relaxation (1) CDS in unit disk graph
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Ad Hoc Networks
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Virtual-Topology Adaptation for WDM Mesh Networks Under Dynamic Traffic.
COSC 6590 Fall Multi-channel, multi-radio wireless networks.
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
MOBILE AD-HOC NETWORKS
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Multi-channel, multi-radio wireless networks
Adhoc and Wireless Sensor Networks
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Multi-channel, multi-radio
EEL 6935 Wireless Ad Hoc Networks
Presentation transcript:

Security and Sensor Networks By Andrew Malone and Bryan Absher

Outline What are sensor networks? Applications Security Key Pre-distribution Key Capture Route Capture

Sensor Networks Sensor Network Collection of inexpensive sensors Wireless communication Randomly distributed nodes Sensor (node) Ultra low power ~10 kilobytes of storage ~10MHz clock 100 m – 900 m communication range (RF)

Benefits of Ad-Hoc Sensor Networks Power Distance 2 Ad-Hoc Sensors Approach Linear Behavior

Applications Military Tracking troops Monitoring battlefields Scientific Collecting data Industrial Tracking packages Monitoring systems

Security Key Management Key Pre-Distribution Create a key pool Pre-Load nodes with keys Nodes share a connection if they share a key

Impractical Approaches to Key Distribution Single Mission Key One Key for Entire Network Assign unique keys to every node Excessive Memory Requirements

Adversary Model Cannot efficiently do cryptanalysis on communications Can physically capture data Can extract keys from nodes

More Efficient Key Distribution Create a key pool Preload nodes with a key ring Very small amount of storage Maintain high amount of security Increases payoff if a node is compromised

q-Composite Key Distribution Nodes are linked if they have q keys in common Decreases probability of connectedness Decreases initial payout for adversary

Comparison

Multi-link Reinforcement Use network topology to strengthen links A new key, K`, is computed using random numbers Random numbers sent across other links

Attacks on Sensor Networks Assume cryptanalysis of traffic hard Physically capturing nodes Capture Strategies Random Capture Key Capture Route Capture

Key Capture Compute the value of each node Value is the number of keys not already captured Capture the highest value node

Route Capture GNAVE algorithm Value each node by the amount of traffic

Comparison