Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Security in Wireless Sensor Networks: Key Management Approaches
Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Author: Hangyang Dai and Hongbing Xu
Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148.
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Key Management Techniques in Wireless Sensor Networks
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture 14: Key Management in WSNs Dr. Kemal Akkaya

Kemal AkkayaWireless & Network Security 2 Key management: Constraints in WSNs  Sensor node constraints:  Battery power Computational energy consumption Communication energy consumption  Transmission range  Memory  Temper protection  Sleep pattern  Network constraints:  Ad-hoc network nature  Packet size  Nodes can easily be captured and compromised  Key Management include the processes of key setup, the initial distribution of keys and key revocation (removal of the compromised key).  Many Security-critical application that depend on key management processes demand a high level of fault tolerance when a node is compromised.

Kemal AkkayaWireless & Network Security 3 Key management approaches classification

Kemal AkkayaWireless & Network Security 4 Approaches  Trusted-Server Schemes  Finding trusted servers is difficult.  Public-Key Schemes  Expensive and infeasible for sensors.  Key Pre-distribution Schemes  Simplest solution is a network-wide shared key. Problem: if even a single node were compromised, the secret key would be revealed, and decryption of all network traffic would be possible.  Slightly better solution: Pairwise keys: Impractical because of storage Use a single shared key to establish a set of link keys, one per pair of communicating nodes, then erase the network-wide key Problem: does not allow addition of new nodes after initial deployment.  Others: Random pre-key distribution Quorum-based

Kemal AkkayaWireless & Network Security 5 Basic probabilistic approach  Due to Eschenauer and Gligor  Relies on probabilistic key sharing among nodes of WSN  Uses simple shared-key discovery protocol for key distribution, revocation and node re-keying  Three phases are involved:  key pre-distribution,  shared-key discovery,  path-key establishment  Key pre-distribution  Generate a large key pool P ( keys) and corresponding key identifiers  Create n key rings by randomly selecting k keys from P  Load key rings into nodes memory  Save key identifiers of a key ring and associated node identifier on a controller  For each node load a key which it shares with a base station  Shared-key Discovery  Takes place during initialization phase after WSN deployment. Each node discovers its neighbor in communication range with which it shares at least one key  Nodes can exchange ids of keys that they poses and in this way discover a common key

Kemal AkkayaWireless & Network Security 6 Path-key establishment  During the path-key establishment phase path-keys are assigned to selected pairs of sensor nodes that are within communication range of each other, but do not share a key  Node may broadcast the message with its id, id of intended node and some key that it posses but not currently uses, to all nodes with which it currently has an established link. Those nodes rebroadcast the message to their neighbors  Once this message reaches the intended node (possible through a long path) this node contacts the initiator of path key establishment  Analysis shows that after the shared-key discovery phase a number of keys on a key ring are left unused

Kemal AkkayaWireless & Network Security 7 Node Capture & Connectivity  Node Capture  More robust then approaches that use single mission key  In case node is captured k<<n keys are obtained  This means that the attacker has a probability of k/P to attack successfully any other WSN link  Connectivity  Two nodes are connected if they share a key  Full connectivity of WSN is not required because of the limited communication capabilities of the sensor nodes  Two important questions:  What should be the expected degree of a node so that WSN is connected?  Given expected degree of a node what values should the key ring size, k, and pool, P, have for a network of size n so that WSN is connected?

Kemal AkkayaWireless & Network Security 8 q-composite approach  Enhancement of the basic probabilistic approach  Idea: nodes should share q keys instead of only one  Approach:  Key pool P is an ordered set  During initialization phase nodes broadcast ids of keys that they have  After discovery each nodes identifies the neighbor with which it share at least q keys  Communication key is computed as a hash of all shared keys  Keys appear in hash in the same order as in key pool  Benefits  q-composite approach has greater resiliency to node capture than the basic approach if small number of nodes were captured  Simulations show that for q=2, the amount of additional communications compromised when 50 nodes (out of 10000) have been compromised is 4.74%, as opposed to 9.52% in the basic scheme  However if large number of nodes have been compromised q-composite scheme exposes larger portion of network than the basic approach  The larger q is the harder it is to obtain initial information  Parameter q can be customized to achieve required balance for a particular network

Kemal AkkayaWireless & Network Security 9 Zhu / Xu approach  Another modification of the basic probabilistic approach  Major enhancement:  Pseudorandom number generator is used to improve security of key discovery algorithm  Also uses secret sharing which jointly with logical paths allows nodes to establish a pairwise key that is exclusively known to the two nodes (in contrast to basic probabilistic approach, where other nodes might also know some particular key)

Kemal AkkayaWireless & Network Security 10 Zhu / Xu approach: key pre- distribution  Background: a pseudo-random number generator, or PRNG, is a random number generator that produces a sequence of values based on a seed and a current state. Given the same seed, a PRNG will always output the same sequence of values.  Key pool P of size l is generated  For each node u, pseudorandom number generator is used to generate the set of m distinct integers between 1 and l (key ids). Nodes unique id u is used as a seed for the generator  Each node is loaded with key ring of size m  Keys for the key rings are selected from key pool P in correspondence with integers (key ids) generated for a particular node by pseudorandom number generator  This allows any node u that knows another nodes v id to determine the set of ids of keys that v poses

Kemal AkkayaWireless & Network Security 11 Further enhancements  So far all the discussed approaches have used one of the following algorithms for shared-key discovery:  Key id notification  Challenge response  Pseudorandom key id generation  Those algorithms work well against so called “oblivious” attacker, the one that randomly selects next sensor to compromise  What if attacker selects nodes that will allow him to compromise the network faster, based on already obtained information (key ids)?  This is the case of so called “smart” attacker

Kemal AkkayaWireless & Network Security 12 Smart attacker  More precisely smart attacker can be defined as follows:  at each step of the attack sequence, the next sensor to tamper is sensor s, where s maximizes E[G(s)| I(s)], the expectation of the key information gain G(s) given the information I(s) the attacker knows on sensor s key-ring  Simulations show that Key id notification and pseudorandom key id generation can be easily beaten by the smart attacker  Challenge response performs better

Kemal AkkayaWireless & Network Security 13 Simulation results Experimental results on id notification and pseudorandom key id generation: Number of sensors to corrupt in order to compromise an arbitrary channel.

Kemal AkkayaWireless & Network Security 14 Simulation results Experimental results on challenge response: Number of sensors to corrupt in order to compromise an arbitrary channel.

Kemal AkkayaWireless & Network Security 15 Background: polynomial based key pre- distribution  Polynomial based key pre-distribution scheme reduces the amount of pre- distributed information still allowing each pair of nodes to compute a shared key  Polynomial based key pre-distribution is λ-collusion resistant, meaning that as long as λ or less nodes are compromised the rest of the network is secure  Utilizes polynomial shares

Kemal AkkayaWireless & Network Security 16 Polynomial based key pre-distribution : initialization  Special case: λ=1  Each node has an id r U which is unique and is a member of finite field Z p  Three elements a, b, c are chosen from Z p  Polynomial f(x,y) = (a + b(x + y) + cxy) mod p is generated  For each node polynomial share g u (x) = (a n + b n x) mod p where a n = (a + br U ) mod p and b n = (b + cr U ) mod p is formed and pre- distributed

Kemal AkkayaWireless & Network Security 17 Polynomial based key pre-distribution : key discovery  In order for node U to be able to communicate with node V the following computations have to be performed:  K u,v = K v,u = f(r u,r v ) = (a + b(r u +r v ) + cr u r v )mod p  U computes K u,v = g u (r v )  V computes K v,u = g v (r u )

Kemal AkkayaWireless & Network Security 18 Polynomial based key pre-distribution : example  Example:  3 nodes: U, V, W, with the following id’s 12, 7, 1 respectively  p=17 (chosen parameter)  a=8, b=7, c=2 (chosen parameters)  Polynomial f(x,y) = 8+7(x+y)+2xy  g polynomials are g u (x) = x, g v (x) = 6 + 4x, g w (x) = 15+9x  Keys are K u,v =3, K u,v =4, K u,v =10  U computes K u,v = g u (r v ) = 7+14*7mod17 = 3  V computes K v,u = g v (r u ) = 6+4*12mod17 = 3

Kemal AkkayaWireless & Network Security 19 Liu-Ning approach  Combination of polynomial-based key pre-distribution and the key pool idea discussed above  Increases network resilience to node capture  Can tolerate no more than λ compromised nodes, where λ is constrained by the size of memory of a node  Idea: use a pool of randomly generated polynomials  When pool contains only one polynomial the approach degenerates to basic polynomial based key pre- distribution scheme  When all polynomials are of degree 0 the approach degenerates to key pool approach  Three phases are involved:  setup,  direct key establishment,  path key establishment

Kemal AkkayaWireless & Network Security 20 Phases  Setup Phase  Set F of bivariate λ-degree polynomials over finite field F q is generated  Each polynomial is assigned a unique id  For each sensor node a subset of s’ polynomial is randomly chosen from F  For each polynomial in the chosen subset a polynomial share is loaded into nodes memory  Direct Key Establishment Phase  During this phase all possible direct links are established  A node can establish a direct link with another node if they both share a polynomial share of a particular polynomial  How to find common polynomial? Use above discussed approaches  Path Key Establishment Phase  If direct connection establishment fails nodes have to start path key establishment phase  Nodes need to find a path such that each intermediate nodes share a common key  Node may broadcast the message with polynomials ids that it posses to all nodes with which it currently has an established link  Once this message reaches the intended node (possible through a long path) this node computes a key and contacts the initiator of path key establishment  Drawback: may introduce considerable communication overhead

Kemal AkkayaWireless & Network Security 21 Grid-based key pre-distribution  Instance of general framework discussed above  Benefits:  Guarantees that any two nodes can establish a pairwise key, if no nodes were compromised  Allows sensors to directly determine whether it can establish a pairwise key with another node and which polynomial to use in case of positive answer

Kemal AkkayaWireless & Network Security 22 Location Aware Purely Random Key Predistribution (P-RKP)  Du et. al (IEEE Infocom 2004)  Improves Random Key Predistribution (Eschenauer and Gligor) by exploiting Location Information.  Studies a Gaussian distribution for deployment of Sensor nodes to improve security and memory usage.  Groups select from key group S (i,j)  Probability node is in a certain group is (1 / tn).

Kemal AkkayaWireless & Network Security 23 Location Aware Purely Random Key Predistribution (P-RKP)  Key sharing graphs used to enable connectivity  Use flooding to find secure path (Limit to 3 hops)  Setting up the key pools  Two horizontally or vertically neighboring pools share a|Sc| keys where 0<= a <= 0.25  Two diagonally neighboring key pools share b|Sc| keys, where 0<=b<=0.25  Two non-neighboring key pools share no keys.  Overlapping factors - a,b