S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed EzzEldin.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Survey of Secure Wireless Ad Hoc Routing
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Security in Wireless Sensor Networks by Toni Farley.
Author: Hangyang Dai and Hongbing Xu
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Key Management and Distribution Anand Seetharam CST 312.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Net 435: Wireless sensor network (WSN)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed EzzEldin

W hy ? WSNs relay important data from the sources to where decision can be made accordingly. WSNs are used in extremely important applications, thus need to ensure: – Data Confidentiality and Integrity. – Data Freshness. – Authorization and Authentication. But for the unique characteristics of WSNs, we are in need to special security protocols.

But WSNs are characterized to be: – Limited resources. – Wireless medium. – No infrastructure. – Multi-hop routing. – Node mobility. The traditional security protocols can not suit well to WSNs. We are in need to special security protocols.

The Famous Attacks on WSNs Security attacks are either Passive or Active. Passive: adversaries do not make any emissions, are mainly against data confidentiality. – Eavesdropping – Traffic analysis types Active: malicious acts are carried out not only against data confidentiality but also data integrity (can be detected).

Active Attacks: Physically compromising the node: – Disassemble to extract all secure materials. – Use it to as fake node within the population. – Tamper proof solution is expensive to low-cost WSNs. Selective forwarding: – WSNs are Multi-hop fashioned networks. – Faithful nodes forward received packets. – Compromised node might just drop packets, however neighbors will use another route – More dangerous if this node forwards selected packets !

Acknowledgment spoofing: – Some routing protocols use acknowledgments. – Attacker may spoof acks to convince that: Weak link is strong. Dead node is alive. – Consequently these weak links may be selected for routing, leads to either lose or corrupt the packets sent through. HELLO flood attack: – Some routing protocols require nodes to broadcast HELLO packets after deployment, for neighbor discovery. – malicious more powerful nodes can broadcast HELLO messages advertising high-quality route to sink

Thus …. link verification and node authentication can be verified by using Key Management Techniques

K ey M anagement Techniques “Pairwise key establishment”: fundamental security service allowing nodes to communicate in cryptographic way. Due to limited resources we can't use any of: -Public-Key-Cryptography -Key-Distribution-Center used in traditional networks. Instead, we use Key Pre(before deployment)-schemes

K ey P re-distribution S chemes Symmetric-key schemes: Single key for encryption and decryption. 1-Unique Random key. 2-Networkwide shared key. 3-Probabilistic key pre-distribution. 4-Polynomial based key pre-distribution. Public-key schemes: Singly key for encryption, while another one for decryption. 1-Reza Scheme. 2-VEGK Scheme.

Symmetric-key schemes: Unique Random Key: 1.Each node is assigned unique random key. 2.To communicate with any node, must use its key. 3.Introduces huge storage overhead: network of n nodes, each must store (n-1) keys. Networkwide Shared Key: Master key used by all nodes, but single node compromise is disaster. Variant, establish link keys with neighbors then erase the master key. Does not allow new nodes to be deployed.

Probabilistic Key Pre-distribution 1.Setup server generates large pool of random keys each is with unique ID. 2.Each node randomly picks subset of keys and their Ids. 3.Two nodes can communicate only if they share a common key. 4.After deployment, each sends list of its keys’ IDs, then use the common keys. If don't have a common key.... need to find number of other nodes to help establish a session key ( called path key ).

This technique: 1.Needs less memory. 2.Can guarantee a high probability of sharing common keys. But compromising small number of nodes discloses a large fraction of keys, as single key may be shared by more than two nodes. For more security, q-composite scheme proposes that two nodes setup key only if they share at least q-common keys.

Polynomial key Pre-distribution Setup server randomly generates a bivariate t-degree polynomial, where f(x,y)=f(y,x). For node with id i, setup server will compute polynomial share of f(i,y) to be pre-loaded for node i. Nodes i and j compute common key f(i,j) as follows: i evaluates f(i,y) at j gets f(i,j) j evaluates f(j,y) at i gets f(j,i) Features: Complex mathematical operations and storage overhead. No communication overhead, as only need the other node’s id.

Elliptic Curve Cryptography is light weight Public Key Cryptography suitable for WSNs

E lliptic C urve Cryptography Reza Scheme: Targets heterogeneous WSNs: nodes, gateways and base-station. Gateways are powerful in terms of energy, computation and memory. Before deployment, server generates and pre-loads ECC keys into sensor and gateways as follows:

Sensor node is pre-loaded with: Unique id. Its own public and private keys. Public key of all gateways in the network. Gateway is pre-loaded with: Unique id. Its own public and private keys. Public key of the base station. public key of all sensor nodes in the network. Sensor nodes are randomly deployed, while Gateways are deployed such that each node can hear form at least one gateway.

Each gateway broadcasts encrypted message with its private key, to all nodes. Each node: 1.Verify the message using the public key of the gateway. 2.Select its neighbor gateway based on Signal-to-Noise-Ratio. Each node can send a session-key request to the gateway with list of its neighbors. Gateway sends the requested key, encrypted with the node’s public key.

This protocol: o Static membership for nodes. o Nodes are tamper proofed which is costly to be considered. o Nodes with high or low power level must store set of ECC keys of other nodes in the whole network. Adversary is unable to impersonate node’s identity except by capturing it. Capturing node: Reveals Its public and private keys. Reveals Pubic key of all gateways. Capturing node reveals does not effect the security of the rest nodes, as no reveal for their private keys.

Virtual ECC Group Key Hierarchical structure of nodes prolong the lifetime. LEACH, the most famous algorithm, balances energy drainage among nodes by randomly rotating CH membership. LEACH toggles between 2 phases, Setup and Steady state. VEGK is a security framework merging ECC with symmetric pairwise keys while making use of clustering for energy saving. * Low-Energy Adaptive Clustering Hierarchy (LEACH)

VEGK Phases Phase 1 “Pre-deployment Key Distribution”: The network is divided into k virtual groups, with G id as identifier. Each group is assigned ECC public and private key. Each node is randomly assigned to a single group regardless its positions in the field. Consequently, each node is pre-loaded with: – The corresponding group identifier G id. – Its private keys – The public keys of all of the k groups. – Unique identifier – ECC private key and public key pair. Nodes can run ECDSA for authenticity checking. * ECDSA :Elliptic Curve Digital Signature Algorithm Group related Node related

Phase 2 “Neighbors Discovery”: Each node broadcasts a message with low power level L to be heard by small number of neighbors. All other nodes within the range: – Decrypt using the corresponding group public key. – Save the id and public key for future communication.

Phase 3 “Cluster Head Announcement”: During setup-phase, all nodes capable to operate as CHs, announce themselves as CHs to their neighbors with low power level L. The node might select its potential CH based on one or more criteria. Not CHs Nodes can safely delete its group’s private key and still can communicate with new nodes.

Phase 4 “CHs Tree Construction”: Tree rooted at the BS is constructed to guarantee the network connectivity and to ensure security. Any selected CH joins the tree by a Join-Tree-Request message, sent with power level R (greater than L). CHs decrypt, save and verify messages heard with no reply.

BS hears from the closest CHs, saves their ids and verifies them. The BS replies with Accept- (Reject)-Tree-Joining message. The Accept consists of “1 st level” notification, session key and f(Nonce) encrypted using node’s public key of the received identifier. The first level CHs, reply to all previously saved CHs, with “2 nd level” notification, session key and f(Nonce) encrypted using node’s public key of the received identifier.

This process is repeated till a tree of CHs is constructed. To avoid looping, any CH must have one parent CH and any CHs as children. CHs can safely delete its group’s private key and still can communicate with new nodes by the public key of the corresponding group.

Phase 5 “Clusters Formation”: To form the clusters, each CH sends Join-Me request to all of its neighbors with power level L, encrypted by its private key. The node replies to the CH with Join-Accept message encrypted by the public key of the CH. Extra message (S-Key message) is transmitted from the CH to each, for session key and time slot identifier.

Attach scenarios ! Attacker with no signed public/private key pair of any group, will be discarded from the first phase by using ECDSA. Assume he got at least single group key pair and does not have signed private/public for his own usage, will be discarded from the first phase using ECDSA. Assume he faked tree level indicator without being aware of the nonce function used, will be discarded in the last phase for the incorrect value of the calculated nonce.

This protocol: o No Static membership for nodes, as no node is CH for its whole life. o No tamper proof needed, as for the random rotation of CH membership, the adversary faces difficulties in identifying the CHs. o No need to store set of ECC keys of other nodes in the whole network in each node, as each node saves only the ECC keys of its neighbors. o VEGK allows scalability by adding new nodes.

ECC Security Analysis This hybrid method supports: – Data confidentiality. – Integrity. – Node authentication. Public key cryptography prevents a huge set of famous attacks, in addition of the replay attack using nonce. Capturing node does not affect the security of the rest of the nodes as no reveal for their private keys.

Thanks ! Any Questions ?

R eferences “A Key Management Scheme for Cluster Based Wireless Sensor Networks” 2008 IEEE/IFIP International Conference. “Security in wireless sensor networks” communication of the ACM june 2004/Vol 47. “Security for wireless sensor networks” Advances in information security springer. “Analyzing the Key Distribution from Security Attacks in Wireless Sensor” Piya Techateerawat and Andrew Jennings. “Secure Clustering and symmetric key establishment in heterogeneous wireless sensor newtorks” Research article Reza Azarderskhsh and Arash reyhani. “Cryptography and Security in Wireless Sensor Networks” Pyrgelis Apostolos, University of Patras. “Security and Privacy in Sensor Networks” Haowen Chan and Adrian Perrig, Carnegie Mellon University. “VEGK: Virtual ECC Group Key for Wireless Sensor Networks”, ICNC’13, Ahmed E. El-Din, Rabie A. Ramadan and Magda B. Fayek.