Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.

Slides:



Advertisements
Similar presentations
Trust relationships in sensor networks Ruben Torres October 2004.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Authentication paramount practices in wireless networks By: Ahmad Almadhor and Aaron Black.
A Security Protocol for Sensor Networks Khadija Stewart, Themistoklis Haniotakis and Spyros Tragoudas Dept. of Electrical and Computer Engineering Southern.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Security Issues In Sensor Networks By Priya Palanivelu.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Wireless Sensor Network Security Anuj Nagar CS 590.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
Key management in wireless sensor networks Kevin Wang.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Intrusion Tolerance for NEST
Presented by Prashant Duhoon
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University

Overview Overview of Wireless Sensor Networks (WSN). Security in wireless sensor networks. Why is it different? Our recent work on securing WSN using deployment knowledge Authenticating public keys (Mobihoc’05) Robust Location discovery (Infocom’05) Summary

Wireless Sensors Berkeley Motes

Mica Motes Mica Mote: Processor: 4Mhz Memory: 128KB Flash and 4KB RAM Radio: 916Mhz and 40Kbits/second. Transmission range: 100 Feet TinyOS operating System: small, open source and energy efficient.

Wireless Sensor Networks (WSN) Deploy Sensors

Applications of WSN Battle ground surveillance Enemy movement (tanks, soldiers, etc) Environmental monitoring Habitat monitoring Forrest fire monitoring Hospital tracking systems Tracking patients, doctors, drug administrators.

Securing WSN Motivation: why security? Why not use existing security mechanisms? –WSN features that affect security.

Why Security? Protecting confidentiality, integrity, and availability of the communications and computations Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission Sensor nodes can be physically captured or destroyed

Why Security is Different? Sensor Node Constraints –Battery, –CPU power, –Memory. Networking Constraints and Features –Wireless, –Ad hoc, –Unattended.

Sensor Node Constraints Battery Power Constraints –Computational Energy Consumption Crypto algorithms Public key vs. Symmetric key –Communications Energy Consumption Exchange of keys, certificates, etc. Per-message additions (padding, signatures, authentication tags)

Memory Constraints Program Storage and Working Memory –Embedded OS, security functions (Flash) –Working memory (RAM) Mica Motes: 128KB Flash and 4KB RAM

An Efficient Scheme for Authenticating Public Keys in Sensor Networks

Wireless Sensor Networks Deploy Sensors

Key Distribution in WSN Deploy Sensors Secure Channels

Existing Approaches Key Pre-distribution Schemes Eschenauer and Gligor, CCS’02 Chan, Perrig, and Song, S&P’03 Du, Deng, Han, and Varshney, CCS’03 Du, Deng, Han, Chen, Varshney, INFOCOM’04 Liu and Ning, CCS’03 Assumption Public Keys are impractical for WSN We need to use Symmetric Keys

Three Years Later Has Public-Key Cryptography (PKC) became practical yet? The answer might still be NO, but … Recent Studies on using PKC on sensors PKC is feasible for WSN ECC signature verification takes 1.6s on Crossbow motes (Gura et al.)

The Advantage of PKC Resilience versus Connectivity SKC-based schemes have to make tradeoffs between resilience and connectivity PKC-based Key Distribution 100% resilience 100% connectivity

Let’s Switch to PKC? Sorry, I forgot to mention one thing: The gap between SKC and PKC is not going to change much unless a breakthrough in PKC occurs. Computation costs RC5 is 200 times faster than ECC Communication costs Signatures: ECC (320 bits), RSA (1024 bits), SHA1 (160 bits)

New Focuses My observation: We will be able to use PKC, but we will use SKC if that can save energy. We are doing this in traditional networks Example: session keys Research Problem Can we reduce the amount of PKC computations with the help of SKC?

Public Key Authentication Before a public key is used, it must be authenticated In traditional networks: we use certificates. Verifying certificates is a public key operation

Authenticating Public Keys in Traditional Networks 1. What is your public key? 2. Here is my public key PK 2. Here is my public key PK and certificate 3. Verify the certificate: a public key operation A B

Authenticating Public Keys in Sensor Networks Naïve Solution 1: preload all the public keys Memory cost: (N-1)*320 bits for 160-bit ECC Naïve Solution 2: preload the hash of all the public keys Hash is the commitment. Memory cost: (N-1)*160 bits for SHA1

Can We Improve Memory Usage? Much less than N-1 commitments Hash everything together: need 1 commitment Communication cost: O(N) A standard technique: Merkle Tree Memory cost: O(log N) Communication cost: O(log N)

Using Merkle Trees

Performance Memory Usage 1 + log(N) hash values (compared to N-1) Computation Cost Log(N) hash operations Communication Overhead If we use 160-bit SHA1 160 * log(N) bits When N=10,000, cost=2080 bits, worse than PKC We need to reduce the height

Trimming the Merkle Tree

A Smarter Trimming AB C

Deployment Knowledge How do we know that some nodes might more likely be neighbors than others? Deployment knowledge model.

A Group-Based Deployment Scheme

Modeling of The Group-Based Deployment Scheme Deployment Points

Trimming Strategy

Deployment-based Trimming

Finding Optimal a,b,c, and d The optimization problem: S: number of sensors in each deployment group m max : maximum amount of memory that can be used W i : percentage of nodes that are in the i group. This is decided by the deployment model We assume the Gaussian Distribution Minimize C = w 0 a + w 1 b + w 2 c + w 3 d  Subject to

Evaluation

Communication Overhead vs. Memory Usages

Communication Overhead vs. Network Size

Impact of Deployment Knowledge: σ Deployment Model: Gaussian Distribution

Impact of Modeling Accuracy

Energy consumption

Comparing Energy cost with RSA / ECC Performance of authenticating public keys using various algorithms

Summary Public Key Cryptography (PKC) Will soon be available for sensor networks Intel Motes: very powerful. Usage of PKC should still be minimized We propose an efficient scheme to achieve public key authentication.

A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks

Location Discovery in WSN Sensor nodes need to find their locations Rescue missions Geographic routing protocols Many other applications Constraints No GPS on sensors Cost must be low

Existing Positioning Schemes Beacon Nodes

Two Important Elements Reference points They must know their locations. e.g. beacon nodes, satellites. Relationship between nodes and reference points Distance Angle of arrival Time of arrival Time difference of arrival

The Beacon-Less Scheme Without using beacon nodes Beacon nodes are more expensive They can be the main target of attacks Nonetheless, we still have to find reference points and the corresponding relationships. Remember: the locations of the reference points must be known.

Modeling of The Group-Based Deployment Scheme We still need another important element: The relationship between nodes and reference points. Deployment Points: Their locations are known.

The Relationships A

A B

Modeling of the Deployment Distribution Using pdf function to model the node distribution. Example: two- dimensional Gaussian Distribution. Other distribution can also be used.

The Idea Observation at location O See more nodes from A and D than from H and I. Observation at location P Quite different from location O. See more nodes from H and I than from A and D. Given a location, we can derive the observation. Given the observation, can we derive the location?

The Problem Formulation Location θ = (x, y) Observation a = (a 1, a 2, … a n ) Location Estimation

A Solution Definitions a = (a 1, a 2, … a n ): The observation. f n (a | θ): The probability of observing a at location θ. Maximum-Likelihood-Estimation (MLE) Principle: find θ, such that f n (a | θ) is maximized.

Maximum Likelihood Estimation Likelihood Function f n (a | θ) = Pr (X 1 =a 1, …, X n =a n | θ) = Pr (X 1 =a 1 | θ) · · · Pr (X 1 =a n | θ) L( θ) = log f n (a | θ) Find θ: Gradient Descent Method

Evaluation Setup A square plane: 1000 meters by 1000 meters 10 by 10 grids (each is 100m X 100m) σ = 50 (Gaussian Distribution) What to evaluate? Accuracy vs. Density Accuracy vs. Transmission Range Boundary Effects Computation Costs.

Effect of Density m An Improvement: Dummy Nodes m: number of sensors in each group

Effect of Transmission Range R

Effect of Boundary

Comparing the Three Numeric Approaches (Cost)

Comparing the Three Numeric Approaches (Accuracy)

Comparisons Beacon-LessBeacon-Based Communication Overhead Low Computation Cost HighLow Device Cost LowHigh Robustness/Security HighLow Mobility NoneGood

Conclusion and Future Work Two Applications of Deployment Knowledge Authenticating Public Keys Beacon-Less Location Discovery IPDPS’05 paper: Location Anomaly Detection Future Work Optimizing public-key protocols for sensor networks