LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures and Hash Functions. Digital Signatures.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Computer Security Key Management
Public Key Algorithms …….. RAIT M. Chatterjee.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Key Distribution CS 470 Introduction to Applied Cryptography
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Lecture 6: Public Key Cryptography
Computer Science Public Key Management Lecture 5.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
Introduction to Public Key Cryptography
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Brian Padalino Sammy Lin Arnold Perez Helen Chen
An Efficient Identity-based Cryptosystem for
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1 Collaborative Processing in Sensor Networks Lecture 7 - Light-weight Security Solutions Hairong Qi, Associate Professor Electrical Engineering and Computer.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Overview of Cryptography & Its Applications
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Chapter 4: Public Key Cryptography
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
1 Calculations over an Elliptic curve, HOW DO WE DO IT? Why do we need it for WSN? Ortal Arazi Electrical & Computer Engineering Department The University.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Security of the Internet of Things: perspectives and challenges
Cryptography and Network Security Chapter 13
Diffie-Hellman Key Exchange
How to Use Charm Crypto Lib
Presentation transcript:

LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings Myunghan Yoo August 2, 2008

Progress  Problem & background  Solution  Discussion

Public Key Cryptography  Use private and public keys  Given public key, easy to compute -> anyone can lock  Only those who has private key compute its inverse -> only those who has it can unlock, vice versa. P D E()D() Key Attacker P KeKe KdKd C P C=E(P, K e ) P=D(C, K d ) Insecure channel Key

 For Privacy - Encrypt M with Bob’s public key : C = e K (B p,M) - Decrypt C with Bob’s private key : D = d K (B s,C) * Anybody can generate C, but only Bob can recover C to M. Usage of PKC (I) e k (, ) M BPBP d k (, ) C M BSBS Public directory Alice : A p Bob : B p Chaum : C p.

Usage of PKC (II) d k (, ) M AsAs e k (, ) C M ApAp Alice : A p Bob : B p Chaum : C p. Public directory - Encrypt M with Alice’s private key : C = d K (A s,M) - Decrypt C with Alice’s public key : D = e K (A p,C) * Only Alice can generate C, but anybody can verify C.  For authentication (Digital Signature)

Motivation & Objective  Public Key Cryptography (PKC)  Denial-of-Service Attack in PKC  With repeated & meaningless requests to normal nodes to establish a session key, the adversary causes attacked normal nodes to waste energy resources ProsCons ResilienceHigh computational overhead ScalabilityWeak against DoS attacks Decentralized key management

Objective & Key Idea  Objective  Mitigating Denial-of-Service (DoS) attacks  Key Idea  Loading heavy computational burden on the instigator

Progress  Problem & background  Solution  Discussion

Overview of Proposed Scheme Stage A: Alice proving her validity to Bob A relatively energy draining procedure on Alice’s part Stage B: Bob proving her validity to Alice A relatively low energy draining procedure on Bob’s part If successful If successful: both users hold an ephemeral shared secret key

The Instigator Proving Its Validity AliceBob n A ID A CR A (CR A ) e mod n CA = H(n A, ID A ) If so, generates a message, m, such that: t= m e mod n A t t d A mod n A = m x: LSB of message m compares n A : Alice’s public key, ID A : Alice’s public key ID, CR A : Alice’s certificate signed by CA with its private key, e, n CA : CA’s public key CR A = [H(n A, ID A )] d ca mod n CA H(n A, ID A ) = n A ID A 512 bits or 1024 bits

Message m  x: Significant bits to identify the instigator  y and z: Factors of an ephemeral key z 212bits y 200bits x 100bits Example of message m where the length of m is 512 bits.

Overview of Proposed Scheme Stage A: Alice proving her validity to Bob A relatively energy draining procedure on Alice’s part Stage B: Bob proving her validity to Alice A relatively low energy draining procedure on Bob’s part If successful If successful: both users hold an ephemeral shared secret key

The Approached Node Proving Its Validity  Key Transport  Elliptic Curve Digital Signature Algorithm (ECDSA)  Self-Certified DH Fixed Key-Generation

Key Transport AliceBob Stage A If successful n B, CR B, ID B, S B Validation of the values: (CR B ) e mod n CA = H(n B, ID B ), (S B ) e mod n B = y If successful K AB-final = z Stage B: S B = y d B mod n B

ECDSA AliceBob Stage A If successful (C, L) Calculates h = L-1, q1 = y · h mod ordG, q2 = C · h mod ordG, P = q1 · G + q2 · V, and C’ is scalar of P If C’ = C K AB-final = z Stage B: V = u · G C is scalar of V L = u -1 (y + dB · C) mod ordG

Self-Certified DH Fixed Key-Generation Stage A If successful Self-Certified DH Fixed Key-Generation K AB-temp = K AB (generated by Alice) = n A x [H(ID B, n B ) x n B + n CA ] = K BA (generated by Bob) = n B x [H(ID A, N A ) x n A + n CA ] Stage B: K AB-final = H(K AB-temp, m’) n B, CR B, ID B AliceBob

Implementation Results Time (msec)Energy (J)Total AliceBobAliceBobTimeEnergy Stage A Stage B Key Transport ECDSA Fixed Key Time (msec)Energy (mJ) Total consumptionBoth stages Key Transport ECDSA Fixed Key Using 1024-Bit RSA and 160-bit ECC on the Intel MOTE 2 Platform from 312 MHz core clock

Progress  Problem & background  Solution  Discussion

Contribution  This paper may be the first try of DoS attack mitigation for PKC

Discussion  Unclear environment of implementation  communication distance between Alice and Bob  Yet, unsuitable PKC in the WSN  Incoherent logic  Applying to only a suspicious node is needed  DoS attack with incomplete stage A

DoS attack with incomplete stage A AliceBob n A ID A CR A (CR A ) e mod n CA = H(n A, ID A ) If so, generates a message, m, such that: t= m e mod n A t t d A mod n A = m x: LSB of message m compares n A : Alice’s public key, ID A : Alice’s public key ID, CR A : Alice’s certificate signed by CA with its private key, e, n CA : CA’s public key CR A = [H(n A, ID A )] d ca mod n CA H(n A, ID A ) = n A ID A 512 bits or 1024 bits Completed part Incompleted part

THANK YOU Q&A