Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security Issues In Sensor Networks By Priya Palanivelu.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Version Number Authentication and Local Key Agreement Levente Buttyán Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Security for Broadcast Network
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit LAEP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit

Outline Motivation Overview Key Establishment Inter-node Traffic Performance Evaluation Security Analysis

Motivation Background- Deployment of a sensor systems in unattended and adversarial environments, requires confidentiality and authentication. Providing security is hard due to resource limitations: each node consists of 4MHz processor and 8 kb memory (hence asymmetric cryptosystems are not practical). Establishing a shared key is the main issue.

Motivation continue… Solution: Pre deployed keying. One approach – All the nodes share the same key. Low storage cost, but also low security. Second approach – Every two nodes share a different key. Ideal security, however, how many keys will we need? What about dynamic networks? Moreover, effectiveness of in-network reduced or prevented.

Solution – LEAP Localized Encryption and Authentication Protocol A key management protocol for sensor networks. Supports in ‘in-network’ processing. Provide security properties similar to the second approach. Support multiple keying mechanism. Motivation- Different types of massages require different security levels.

Assumptions Sensor networks are static. The base station acting as a controller and supplied with long-lasting power. The sensors are similar in capabilities. Every node has space for storing hundreds of bytes. The immediate neighboring are not known in advance. Adversary can eavesdrop all traffic, inject packets or replay older massages. The base station can not be compromised.

Design Goals LEAP design efficient security mechanism for supporting communication in sensor networks. The sensor should be robust against security attacks. The attacks impact should be minimal. The protocol support optimization mechanisms such as in network. Key establish process should minimize the computation.

Overview Establishments of four types of keys: Individual key – Every node shares a unique key with the base station for secure communication such as reporting of a unexpected neighboring behavior. Group key – A globally shared key that is used the base station to broadcast to the whole group, for example to issue missions, query or instructions. Cluster key – A key shared by a node and all its neighbors for securing locally broadcast massages in order to save transmitions. Pairwise key - A shared key by a node and each of its neighbors for secure communication such as for distribution cluster key.

Key Establishment Establishing Individual Node Keys: The controller has a master key . For each node u, its key generated and pre-loaded prior to the node deployment. Generating the key is as follows: When the controller needs to communicate with an individual node u, it computes it on the fly. The storage and the computational overhead are negligible. Pseudo random function Node unique ID

Pseudo random function A function from {0,1}n to {0,1}m. A good PRF is acting as “almost” random function. Meaning, given two strings from {0,1}m , one is completely random, and the other is an output of a PRF, the probability that an adversary will be able to tell the different between them is negligible.

Key Establishment continue… Establishing Pairwise Shared Keys: Assume a lower bound interval Tmin necessary for an adversary to take control of a sensor node. Assume also Ttest is the time for a newly deployed node needs to discover its immediate neighbors, and Ttest < Tmin (a reasonable assumption for most sensor networks and adversaries).

Key Establishment continue… Four steps for adding a new node- The controller generates an initial key kI and loads each node with it. Each node v derives a master key When u is deployed it broadcasts a “HELLO” massage. Each neighbor v reply Each side compute Erasing all the master keys and kI. A random number Massage authenticated code Special case – u and v added at the same time. Key is kvu if v < u.

Massage authenticated code An efficient function MACk(m): {0,1}l × {0,1}* {0,1}l. To authenticate m, send <m,MACk(m)> Upon receiving <m,a>, verify that a= MACk(m).

Key Establishment continue… Establishing Cluster Keys: Node u generates a random key and encrypts it with the pairwise key of each neighbor vi. Node vi decrypts the massage and keeps the key. If one of the neighbors is revoked, node u generates a new cluster key. Encryption

Key Establishment continue… Establishing Multi-hops Pairwise Shared Keys: Extend the circle of neighbors. Not just for immediate neighbors but also multiple hops away nodes. Works well only if: Multiple hops pairwise shared key can be established within Tmin. A node has enough memory space. What if not?

Key Establishment continue… Establishing Two-hops Pairwise Shared Keys: Secure against m-1 nodes corruption. Node u has to find by a QUERY massage, all the neighbors v1,…,vi that are common to it and the target node c. To establish a pairwise key S with node c, node u split S into i shares such that , it then forwards each ski to c through vi: Authentication key of ski

Key Establishment continue… Establishing Group Keys: A key that is shared by all the nodes in the network. Necessary when the controller distributing a massage to all the nodes. Instead of using the hop-by-hop method, which is too wasteful (each node has to decrypt and encrypt the massage), the group key will be pre-load into every node. An important question arises: How do we securely update the key? Naïve approach – Use individual key. Not scalable. Solution – Secure Key Distribution using TESLA.

Key Establishment continue… Authentic Node Revocation: TESLA - broadcast authentication protocol. Based on the use of a one-way key chain and delayed key discloser. The node to be revoked To be disclosed TESLA key Verification key New group key

Key Establishment continue… Secure Key Distribution: Organize the nodes in BFS. Each node keep tracks with its immediate neighbors. The new group key is distributed via recursive process. Each node transmit it down the tree using its own cluster key. Hop-by-hop is not too wasteful due to the small massage – key, and the event infrequency. The key should update even if no revocation event occurs.

Inter-node Traffic Authentication: A mandatory requirement is that every massage must be authenticated before it is forwarded or processed. Authenticated scheme must be easy to compute. TESLA is not suitable – due to latency and storage. Pairwise key authentication preclude passive participation. Hop-by-hop authentication is possible, overhead is small because a MAC is easy to compute, but does not protect against inner adversaries which compromise a node.

Inter-node Traffic Authentication: One–way Key Chain Based Authentication: protects against impersonation attack. Every key generates a one way hash key chain, then transmit the first key to each neighbor encrypted with the pairwise key. Each massage authenticate with the next key chain. The keys are disclosed reversely. Triangular inequality: |uv|<|ux|+|xv|. Adversary x can not reuse node’s u auth’ keys to impersonate u. v x u

Inter-node Traffic Authentication: Probabilistic Challenge Scheme: The following attack can not be prevented still: an insider adversary can shield node v by letting two node transmit at the same time, and then using the key which was not received to authenticate its own message. Solution: challenge the authenticity of a received packet with a certain probability. Challenge probability Pc pc=pr/d pr, probability that a node get challenged. The adversary does no know it

Performance Evaluation (key establishment, key updating) Computational cost: Only consider the cost of group and cluster keys. Updating cluster key require to encrypt the new one with the pairwise keys, computational depends on the neighbors number. Number of nodes being revoked. Number of legitimate neighbors of each d0.

Performance Evaluation (key establishment, key updating) Computational cost: For an network size N, the average number of symmetric key operations is 2se/N. Distributing group key require 2N operations. The average cost is two operations per node. The average number of symmetric key operations for each node is where each node’s degree is 2(d-1)2/(N-1)+2.

Performance Evaluation (key establishment, key updating) Communication Cost: Same as computational. Group rekeying based on logical key tree requires O(logN) communication cost. Storage Requirement: Each node has to keep four types of keys. For d neighbors, it has one individual key, d pairwise keys, d cluster keys and one group key. In addition, it keeps each neighbor commitment and its own chain key.

Performance Evaluation (key establishment, key updating) To avoid storing the entire key chain, deploy the optimization algorithm of Coppersmith and Jakobsson to trade storage and computation cost which performs hashes per output element using memory cells. Total number of stored keys is: 3d+2+L. The number of keys a node stores for its key chain. L=20, d=20, a node stores 82 keys, totally 656 bytes when a key size is 8 bytes.

Security Analysis (keying mechanisms) Upon compromise detection, an efficient revocation takes place: update the group and cluster keys, and delete its pairwise keys from each node. Survivability- Obtaining Individual key does not help the adversary to launch attacks. Spoofing and altering massages are difficult.

Security Analysis (keying mechanisms) Possessing the pairwise and cluster keys, allows the adversary establish false massages. The possible damage can be localized, since a node can establish trust relationships only with its neighbors. Possessing the group key allows the adversary reading the massages from the base station, but not to impersonating to it because of the authentication mechanism.

Security Analysis Defending against various attacks on secure routing- Adversary tries to convince all or part of the nodes that it is their neighbor. Adversary replicates the compromised node and add multiple replicates into the network and try to establish pairwise keys with his so called neighbors. Adversary convince other nodes that they are localized in a different distance from the base station.

Related Work Stajano and Anderson proposed that bootstrap trust relationship through physical contact. Perrig et al present security protocols for sensor networks like SNEP for data confidentiality and two parties data authentication and TESLA. There scheme uses base station to establish individual key. Zhu et al propose bootstrapping trust among mobile nodes based on TESLA and one-way hash. Eschenauer and Gilgor present a key management scheme for sensor networks based on probabilistic key predyployment, which was extended by Chan et al to three mechanisms for key establishment. Basagni et al discuss rekeying scheme for periodicity updating encryption key in a sensor network. Nodes temper free and trust each other.

Summery LEAP, key management protocol for sensor networks, provides authentication and confidentiality. Support in ‘in network’ processing and passive participation. Different types of massages require different security levels, hence four types of keys are established.