Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.

Slides:



Advertisements
Similar presentations
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Advertisements

Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Aggregation in Sensor Networks
Key Management in Mobile and Sensor Networks Class 17.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
The Sybil Attack in Sensor Networks: Analysis & Defenses
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Author: Hangyang Dai and Hongbing Xu
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Key Management Techniques in Wireless Sensor Networks
Presentation transcript:

Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song

2 Index Introduction Basic Scheme Q-composite Scheme Multi path Key Reinforcement Scheme Random Pair wise Scheme Conclusion

3 Sensor Networks What are Sensors ? –A device that responds to physical stimulus (as heat, light, motion etc) and transmits a resulting measurement impulse Revolutionizes information gathering and processing Networking sensors: ability to coordinate among themselves on a larger sensing task

4 Applications Real time traffic monitoring Real time pollution and temperature monitoring Building safety monitoring systems Wild Life Monitoring and Tracking Military sensing and tracking Monitoring complex machinery and processes Video surveillance

5 Sensor Network Limitations Impracticality of public key cryptosystems Vulnerability of nodes to physical capture Nodes not tamper resistant (neighbor distrust) Lack of a-priori knowledge of post deployment configuration Limited memory resources Limited bandwidth and transmission power Over-reliance on base stations exposes vulnerabilities

6 Bootstrapping Security Requirements Deployed nodes must be able to establish secure node to node communication Scheme should be functional without involving the base station as arbiter or verifier Additional legitimate nodes deployed at a later time can form secure connections with already-deployed nodes Unauthorized nodes should not be able to establish communications with network nodes and thus gain entry into the network The scheme must work without prior knowledge of which nodes will come into communication range of each other after deployment. The computational and storage requirement of the scheme must be low, and the scheme should be robust to DoS attacks from out-of-network sources.

7 Evaluation Metrics In Key Setup Schemes Resilience against node capture Resistance against node replication Revocation Scale

8 Review Of “Basic Scheme” Proposed by Eschenauer and Gligor 4 phases - Initialization - Node Deployment - Key Setup - Path Key Generation

9 Initialization Phase Pick a random set of keys S out of the total possible key space “Key Ring” : for each node, randomly select m keys from S and store in node memory Criteria : two random subsets of size m in S will share at least one key with probability P

10 Deployment And Key Setup Phases Sensor nodes are deployed Key Setup Phase –key discovery: a short identifier is assigned to each key before deployment each node broadcasts its set of identifiers –verification: nodes containing shared keys in their “key rings” verify that neighbor actually holds key by challenge response protocol

11 Path Key Generation A connected graph of secure links is formed Nodes setup path keys with nodes in their vicinity whose share keys are not present in their key rings Path can be found from source node to its neighbor from connected graph Source node generates path key and sends it securely via the path to target node

12 Parameter choices for connected graph (Erdös-Rényis Formula) For high graph connectivity during key-setup phase right parameters need to be picked D -> degree for the vertices in graph such that graph is connected with a high probability c =0.999 D = ((n-1)/n) (ln(n) – ln(-ln(c))) where n is network size Probability of successful key setup with some neighbor, p = (d/n’) where n’ is expected no. of neighbors

13 Q-composite scheme : An improved “Basic Scheme” Initialization same as Basic Scheme but with different size of selected key pool S In Key Setup Phase, key discovery is more secure, using Merkle Puzzles In Key Discovery every node identifies every neighbor node with which it shares at least ‘q’ keys Link Key K is generated as a hash of all shared q’ keys, where q’ >= q eg : K = hash( k1 ll k2 ll k3 ll….ll kq’ ) Key Setup is not performed between nodes that share fewer than q keys

14 Key Pool Size Computation- A Tradeoff amount of key overlap required for key setup is q (increased from 1 in Basic) Hence exponentially harder for adversary with a given key set to break a link But to preserve probability of two nodes sharing sufficient keys to establish a secure link, size of key pool S to be reduced Reduced pool size allows attacker to gain larger sample of S by breaking fewer nodes Optimum overlap – best security !!

15 Observation : For Optimal Choice of key overlap, expected no. of nodes to be captured for eavesdropping (0.1 probability) is high M = 200 keys P = 0.5 Evaluation: Pool Size Computation

16 Pool Size Computation P(i) -> no. of ways to choose two key ring with i common keys Pconnect -> probability of any two nodes sharing sufficient keys to form a secure connection Then p(i) is given as : Pconnect = 1 – (p(0) + p(1) +…..+p(q-1)) For minimum key overlap q and min. connection probability p, choose largest ISI such that pconnect >= p

17 Evaluation Metric : resilience against node capture by calculating the fraction of links in the network that an attacker is able to eavesdrop on indirectly as a result of recovering keys from captured nodes

18 Evaluation Metric : estimation of max. supported size of network given certain security properties hold

19 Multipath Key Reinforcement – An Add On to “Basic Scheme” Initial Key Setup using Basic Scheme Now, consider the secure link between nodes A and B after key-setup This link is secured using a single key k from pool S

20 Problem Problem - k may be present in key ring memory of some other nodes If any of these nodes are captured, security of A->B is in jeopardy Solution : update communication key to a random value after key – setup Coordinate key update over multiple independent paths

21 Multipath Key Update Assumption : j be the no. of disjoint paths between A and B created during key setup Node A generates j random values v1,v2…vj of same length as shared key Each value is routed along a different path to B and when B receives all j keys, new link key is computed as: k’ = k + v1 + v2 + ….+ vj Long paths are not suitable 2-hop multipath key reinforcement is optimal –Discovery overhead is minimized

22 Evaluation Observation : reinforced basic scheme works best Metric : Resistance against node capture

23 Evaluation Observation : Multipath Key Reinforcement gives boost when implemented with basic scheme Metric : Maximum Supportable Network Sizes

24 In all schemes so far, no node can authenticate the identity of a neighbor it is communicating with Ex. A shares some set of keys with B –It is possible that C could also posses this key –Hence, A does not know if is communicating with B for sure Random-pairwise keys scheme

25 Node to node authentication Possible if a node can ascertain the identity of the nodes that it is communicating with Useful in many cases: -Detecting node misbehavior -Resisting node replication attack -Shift security functions away from the base station

26 Random pairwise scheme: properties Perfect resilience against node capture Node to node identity authentication Distributed node revocation Resistance to node replication Comparable scalability

27 Random pairwise scheme: description To achieve the probability p described by ER formula, in a network of n nodes: –Each node need only store a random set of np pairwise keys (instead of n-1) –Thus, if node can store m keys, network size n=m/p –“n should increase with increasing m and decreasing p”

28 Phase 1: Initialization n=m/p unique node identities generated Each node identity matched with m other randomly selected distinct node IDs –Pairwise key generated for each pair of nodes –Along with ID of other node that also knows the key, key is stored at both nodes

29 Phase 2: Key Setup Each node broadcasts node ID to immediate neighbors By searching in each others key rings, neighboring nodes can tell if they share a common pairwise key Cryptographic handshake performed between neighbors to accept the fact that they both have knowledge of key

30 Multihop range extension Key discovery involves much less traffic than random key predistribution Hence can have nodes rebroadcast node ID for certain number of hops

31 Multihop range extension Has impact on maximum supportable network size n  n=mn’/d (as seen earlier, p=d/n’, n=m/p )  Since n’ increases, maximum network size n also increases  Should be used with caution: since message rebroadcast is performed without authentication/verification: can lead to potential DoS attacks  To prevent, can remove multihop range extension, as is not required for random pairwise scheme

32 Support for Distributed Node Revocation Node revocation in random pairwise possible via base stations (but is slow) Assumption: mechanism present in each sensor to detect if neighboring nodes have been compromised Nodes broadcast public votes against a detected misbehaving node. If any B observes more than threshold number t of public votes against A, then B breaks off all communication with A Voting scheme, voting members

33 Support for Distributed Node Revocation Scheme 1: Consider any node A in the network; there are m nodes matched with it –These are voting members for A –Each assigned a random voting key K i –Each also knows hashes of other nodes’ keys –Nodes compute hash of K i to verify vote –Increases memory requirement to O(m 2 )

34 Support for Distributed Node Revocation Scheme 2: Merkle tree mechanism: O(log m) computation per output (fractal traversal) –Only a single verifying hash value (root) needs to be stored –Drawback: necessary to remember which nodes already traversed, to avoid replay votes

35 Threshold issues t should be –Low enough that unlikely that any node has degree < t –High enough that compromised nodes cannot revoke legitimate nodes

36 Broadcast Mechanism Voting scheme uses naïve broadcast, vulnerable to DoS attack Network of voting members form random graph with almost same (high) probability of being connected as original network (mn’/n)

37 Resisting revocation attack To prevent widespread release of revocation keys by compromised nodes, only nodes that have established direct communication with a node B have ability to revoke B Done by distributing revocation keys to voting members in deactivated form, source node knows secret S Bi, which voting members request during key discovery and setup

38 Resistance against node replication/node generation To be resistant to addition of infiltrator nodes derived form captured nodes, in case of capture being undetected by the network Degree of a node limited to counter replication Method for degree counting implemented with public vote counting, thus a node able to track nodes which share pairwise keys with it

39 Conclusion Efficient bootstrapping of secure keys important for secure sensor networks Tradeoffs exist in each scheme, choice depends on which tradeoff is most appealing (scenario dependent) q-composite scheme: good security for small scale attacks/vulnerable to large scale 2-hop multipath: improved security/network traffic overhead Random pairwise: resilient, good security/does not support as large networks as other schemes