A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.

Slides:



Advertisements
Similar presentations
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Advertisements

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 梁紀翔 王謙志 NETLab.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Author: Hangyang Dai and Hongbing Xu
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148.
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder

Key Agreement Schemes Trusted Server Trusted Server Requires trusted infrastructure Requires trusted infrastructure Self-Enforcing Self-Enforcing Asymmetric cryptography Asymmetric cryptography Pre-Distribution Pre-Distribution Key information is pre-distributed prior to deployment Key information is pre-distributed prior to deployment In sensor networks, only a small portion of the keys are predistributed. In sensor networks, only a small portion of the keys are predistributed.

Key Pre-distribution Use only a subset of keys within the network and probabilistically guarantee a connected graph dependent on node density Use only a subset of keys within the network and probabilistically guarantee a connected graph dependent on node density Not all nodes will be connected Not all nodes will be connected Possible to increase this probability and connected nodes if deployment knowledge is used Possible to increase this probability and connected nodes if deployment knowledge is used Nodes will be deployed in some order. Nodes will be deployed in some order. i.e. there is a higher probability that a node deployed at time t we be closer to other nodes deployed at time t than to nodes deployed at time (t+1). i.e. there is a higher probability that a node deployed at time t we be closer to other nodes deployed at time t than to nodes deployed at time (t+1).

Definitions and Assumptions Static Nodes Static Nodes Deployment is evenly distributed through region. Deployment is evenly distributed through region. Is this a safe assumption? Is this a safe assumption? Deployment Point Deployment Point Point location where a node may be deployed Point location where a node may be deployed May reside in an area around deployment point which is defined by a probability density function (pdf). May reside in an area around deployment point which is defined by a probability density function (pdf). i.e. the helicopter where the node is dropped from i.e. the helicopter where the node is dropped from Resident Point Resident Point Point near the deployment point where sensor actually resides. Point near the deployment point where sensor actually resides. i.e. where the node lands. i.e. where the node lands.

Group-Based Deployment Model Group of sensors are deployed at a single deployment point. Group of sensors are deployed at a single deployment point. Increases the pdf with a group Increases the pdf with a group Decreases the pdf between groups. Decreases the pdf between groups. For a uniform distribution policy, there is no knowledge about which nodes will be neighbors For a uniform distribution policy, there is no knowledge about which nodes will be neighbors Requires a larger key pool. Requires a larger key pool. Decreases probability of sharing keys. Decreases probability of sharing keys. This research distributes nodes uniformly in a 2X2 grid. This research distributes nodes uniformly in a 2X2 grid.

Protocol Key Pre-Distribution Key Pre-Distribution Global key pool, S, is divided into t*n (number of groups) number of key pools. Global key pool, S, is divided into t*n (number of groups) number of key pools. Goal is to allow nearby key pools S i, j to share keys with a neighboring group S i+1, j. Goal is to allow nearby key pools S i, j to share keys with a neighboring group S i+1, j. Each node contains a subset m of their groups key pool. Each node contains a subset m of their groups key pool.

Phases 2 & 3 Shared key Discovery Shared key Discovery Broadcast indices of keys. Broadcast indices of keys. Setup secure links with neighbors. Setup secure links with neighbors. Path Key Establishment Path Key Establishment Use previously established secure channels to setup keys with unconnected neighbors. Use previously established secure channels to setup keys with unconnected neighbors. Allows intermediate nodes to determine keys. Allows intermediate nodes to determine keys. Problem: Intermediate nodes may be compromised, choose a key known by attacker. Problem: Intermediate nodes may be compromised, choose a key known by attacker. Probability of securing a link between nodes over three hops is close to one. Probability of securing a link between nodes over three hops is close to one. Requires communication overhead Requires communication overhead Between nodes Between nodes To determine who is choosing the key To determine who is choosing the key

Setting up Key Pools Horizontally or vertically neighboring key pools share (0<a<.25) S c keys 2. Horizontally or vertically neighboring key pools share (0<a<.25) S c keys 2. Diagonal neighbors share (0<b<.25) S c keys Diagonal neighbors share (0<b<.25) S c keys 4a + 4b = 1 4a + 4b = 1 A and B are the over-lapping factors and define the amount of keys shared by neighboring groups. A and B are the over-lapping factors and define the amount of keys shared by neighboring groups. Non-neighboring groups share no keys. Non-neighboring groups share no keys.

Determining Overlapping Factors A determines shared values between horizontal/vertical neighbors. A determines shared values between horizontal/vertical neighbors. Connectivity (100)=.68 Connectivity (100)=.68 B determines shared keys with diagonal neighbors. B determines shared keys with diagonal neighbors. Connectivity (100) =.48 Connectivity (100) =.48

Key Pool Size Group S 1,1 chooses S c from S, then removes those keys Group S 1,1 chooses S c from S, then removes those keys For each cell S 1,j, for j=2…n, pick a*(S c ) keys from S 1,j-1. Then pick (1-a)*(S c ) from pool. For each cell S 1,j, for j=2…n, pick a*(S c ) keys from S 1,j-1. Then pick (1-a)*(S c ) from pool. Repeat for each row S i,j, also picking b*(S c ) keys from S i-1,j-1. Repeat for each row S i,j, also picking b*(S c ) keys from S i-1,j-1. Flaw: There is no guarantee that a key will not percolate from one grid to the next if node (j+1) can pick arbitrary keys from j. Flaw: There is no guarantee that a key will not percolate from one grid to the next if node (j+1) can pick arbitrary keys from j. Causes nodes to share keys. Causes nodes to share keys.

Experimental Setup S = 100,000; a=.167; b=.083. S = 100,000; a=.167; b=.083. Number of nodes = 10,000 Number of nodes = 10,000 Deployment area = 1000m X 1000m Deployment area = 1000m X 1000m t=n=10 t=n=10 Grid size = t X n = 100m Grid size = t X n = 100m Group size = number of nodes / #grids Group size = number of nodes / #grids 100 nodes per group 100 nodes per group Communication Range (R) = 40m Communication Range (R) = 40m S c = 1770 (for each group) S c = 1770 (for each group)

Evaluation Local Connectivity: Probability that two neighboring nodes share a key. Local Connectivity: Probability that two neighboring nodes share a key. M: number of keys M: number of keys

Evaluation cont. Global Connectivity: relation between size of isolated components and size of graph. Global Connectivity: relation between size of isolated components and size of graph. Excludes nodes outside of communication range since this is due to deployment and not key-distribution. Excludes nodes outside of communication range since this is due to deployment and not key-distribution.

Communication Overhead As number of keys increase in memory, communication required decreases. As number of keys increase in memory, communication required decreases.

Point of Uncertainty If each group shares only 1770 keys, a lot of keys are reused unnecessarily. If each group shares only 1770 keys, a lot of keys are reused unnecessarily. 100 nodes per group * 100 keys per node. 100 nodes per group * 100 keys per node. Do we need 100 keys per group? Do we need 100 keys per group? Is group connectivity guaranteed to be 100%? Is group connectivity guaranteed to be 100%?

Questions???