Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.

Slides:



Advertisements
Similar presentations
Giuseppe Bianchi Lecture 6.1: Extras: Merkle Trees.
Advertisements

Chris Karlof and David Wagner
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Trust relationships in sensor networks Ruben Torres October 2004.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Yih-Chun Hu Carnegie Mellon University
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
1 Sensor Networks Security and Privacy in Sensor Networks Haowen Chan and Adrian Perrig SPINS Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
1 Timed Efficient Stream Loss-tolerant Authentication.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Security Introduction Class February Overview  Security Properties  Security Primitives  Sample Protocols.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
SPINS: Security Protocols in Sensor Networks
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Security for Broadcast Network
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
Presented by: Reut Barazani Limor Levy. Contents Introduction Digital signature broadcast message authentication TESLA broadcast message authentication.
Packet Leashes: Defense Against Wormhole Attacks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley

Applications need Security  Earthquake & fire sensors  Pollution monitoring  Energy management  Military applications  Absence of security enables attacks such as spoofing & replay attacks, resulting in DoS or system compromise

Main Security Requirements  Authentication Receiver verifies sender (prevents spoofing) Also provides integrity  Confidentiality Data remains secret  Freshness Receiver knows message is recent (prevents replay)  Digital signatures (non-repudiation) Receiver can prove sender to third party Usually not necessary

System Constraints  Sensors not tamper-proof  Limited energy  Limited computation (4 MHz 8-bit)  Limited memory (512 bytes)  Limited code size (8 Kbytes) ~3.5 K base code (“TinyOS” + radio encoder) Only 4.5 K for application & security  Limited communication (30 byte packets)  Energy-consuming communication 1 byte transmission = instructions

Scenario 1: Static Nodes  Nodes don’t move Drop sensor nodes from airplanes Build sensor nodes into bricks, steel beams  Topology change only for node addition and removal  Goal: Set up shared keys among neighbor nodes

Traditional Approaches  Pre-load global key before deployment Vulnerable to node compromise  Pre-load all pair-wise keys Need O(n 2 ) keys Vulnerable to node compromise Hard to add new nodes  Diffie-Hellman key agreement Computationally expensive Might work if only needed initially Prone to denial-of-service attacks

More Approaches  SPINS [with Culler, Szewczyk, Tygar, Wen] Base station shares key with each node New keys setup through base station Expensive to set up all keys among neighbors through base station  Can we do better? Let’s try a crazy idea …

Key Infection  Collaboration with Ross Anderson  Goal: Nodes set up keys with neighbors  Assumptions: Attacker nodes have same capability as good nodes Attacker nodes less dense than good nodes Attacker compromises small fraction of good nodes  Basic key agreement protocol A  * : A, K A B  A : { A, B, K B } K A K AB = H( A | B | K A | K B )

Key Infection AB M4 M2 M3 M1  Broadcast keys with maximum signal strength

Key Whispering Extension AB M4 M2 M3 M1  Broadcast keys with minimum signal strength to reach neighbor

Secrecy Amplification A B C D E  A & B share K AB, A & C share K AC,, etc.  Strengthen secrecy of K’ AB A  C : { B, A, N A } K AC C  B : { B, A, N A } K CB B  D : { A, B, N B } K BD D  E : { A, B, N B } K DE E  A : { A, B, N B } K AE K’ AB = H( K AB | N A | N B )

Key Infection Summary  Highly efficient  Detailed analysis in progress  Preliminary simulation results: Nodes uniformly distributed over a plane D (density): average # of nodes within radio range # of attacker nodes = 1% of good nodes Table shows fraction of compromised links DBasicWhisperSASA-W 21.1%0.4%1.0%0.3% 31.8%0.6%1.4%0.5% 52.9%1.0%2.4%0.8%

Scenario 2: Dynamic Nodes  Assume nodes roam around  Any pair of nodes communicates  Per-message authentication & freshness

Traditional Approaches  Pre-load global key before deployment Vulnerable to node compromise  Pre-load all pair-wise keys Need O(n 2 ) keys Vulnerable to node compromise Hard to add new nodes  Digital signatures Too expensive on a per-message basis Prone to denial-of-service attacks

TESLA for Authentication  With Canetti, Song, Tygar  Designed for broadcast authentication  Use for point-to-point authentication Only need to set up n public keys  Uses efficient symmetric crypto  Requires loose time synchronization

Basic Authentication Mechanism t F(K) Authentic Commitment P MAC(K,P) K disclosed 1: Verify K 2: Verify MAC 3: P Authentic!  F: one-way function

Security Condition  Security condition (for packet P): on arrival of P, receiver is certain that sender did not yet disclose K  If security condition not satisfied, drop packet  Attacker can at most do denial-of-service attack Speeding up / delaying packets does not help

TESLA  Keys disclosed 2 time intervals after use  Receiver knows authentic K3 K4K5K6K7 t Time 4Time 5Time 6Time 7 K3 P2 K5 P1 K3  Authentication of P1: MAC(K5, P1 ) FF Authenticate K5 Verify MAC F K6 F K5

TESLA: Robust to Packet Loss K4K5K6K7 t Time 4Time 5Time 6Time 7 K3 P5 K5 P3 K3 P2 K2 P1 K2 Verify MACs P4 K4 FF Authenticate K5

Summary  Low overhead Communication (~ 20 bytes) Computation (~ 1 MAC computation per packet)  Perfect robustness to packet loss  Delayed authentication  Also provides freshness  Drawback: not secure with time travel

TIK: TESLA with Instant Key Disclosure  With Hu, Johnson  Assume accurate time synchronization Trimble Thunderbolt GPS clock: ±180 ns  Can disclose key in same packet!  Receiver instantly authenticates packet

Sending a TIK Frame MACDataKey MACDataKey time 

TIK Summary  Example: 11 Mbps network, 300m range With 1  s time synchronization error (e.g. GPS clock synchronization), works for packet size > 20 bytes  Provides strong freshness guarantee  Works for more powerful sensor nodes, PDAs, cell phones, etc.

Conclusion & Open Problems  Efficient key establishment is challenging  Large static sensor networks Use key infection for local key establishment?  Dynamic sensor networks TESLA for point-to-point authentication Also provides freshness Accurate time sync: TIK