Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Secure connectivity of wireless sensor networks Ayalvadi Ganesh University of Bristol Joint work with Santhana Krishnan and D. Manjunath.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Complexity of Network Synchronization Raeda Naamnieh.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Aggregation in Sensor Networks
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Author: Hangyang Dai and Hongbing Xu
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Key Management Techniques in Wireless Sensor Networks
On Constructing k-Connected k-Dominating Set in Wireless Networks
Hongchao Zhou, Fei Liu, Xiaohong Guan
Presentation transcript:

Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University of Minnesota

Outline  Introduction  Notation  Background of Existing key pre-distribution schemes based on random graph theory  Evaluation of Giant component theory for key pre-distribution scheme  Utilizing sensor hardware to control transmission range  Author’s solution for efficient path-key identification algorithm compared to existing schemes

Goal of Authors : Re-visits random graph theory and uses giant component theory by Erdos and Renyi to show that even if the node degree is small, most of the nodes in the network can be connected. The relationship between connectivity, memory size and security to show that they can reduce the amount of memory required or improve security by trading off a very small number of isolated nodes.

Notation  -d the expected degree of a node i.e., the expected number of secure links a node can establish during key set-up  -k number of keys in a node’s key ring  -n network size in nodes  -r communication radius  -n’ the expected number of neighbor nodes within communication radius of a given node  -p probability that 2 nodes share a key  -Pc probability that graph is connected  -B ratio of largest component size to network size  -P size of the key pool  -A area of the field  -w number of key spaces constructed in networks  -T number of key spaces carried by each nodes  -x number of nodes captured

Key pre-distribution in wireless sensor networks Eschenauer and Gligor (EG) In EG, each node randomly picks a subset (called a key ring ) of keys from a large key pool and any pair of nodes can establish a secure connection if they share at least one common key. The three phases are : 1. initialization, 2. key set-up and 3. Path key identification

Chan, Perrif and Song(CPS) Extends EG and developed 2 key pre-distribution techniques: q-composite key pre-distribution and a random pair-wise keys scheme 1. q-composite in this case requires any 2 nodes to share at least q common keys to establish a secure link 2. Random pair-wise keys in this case uses pair-wise scheme based on the observation that not all n-1 keys need to be stored in the node’s key ring to have a connected randome graph with high probability

Du, Deng, Han and Varshney (DDHV) Combined basic scheme with Blom’s scheme. Allows that any pair of (n-1) nodes finds a secret pair-wise key between them with much smaller number of keys than the actual number of nodes. The tradeoff is that, unlike the (n-1) pairwise key scheme, Blom’s scheme is not perfectly resilient against node capture

In all of the above schemes it is not certain that two nodes can generate a pair-wise key. Instead, they have only a guarantee with probability p that this will be possible. To find p so that n nodes in the sensor network are connected, they use a random graph theory.

Random Graph Theory and Key Pre-distribution scheme Erdos and Renyi provided a theory how to determine p so that Pc is almost 1 (i.e. the graph is almost surely connected) This is called Global connectivity. For a network to be connected with probability Pc, p, as determined by the key information(key ring or pool size) should be greater than p as obtained from Erdos and Reny’s Theory. P required – is from Erdos and Reny’s Theory (d/n’) P actual – actual local connectivity is determined by key ring size and key pool size in EB, by the key space in DDHV and by the number of pairwise keys sotred in each node in CPS

Theorem 1 : P required = d/n’ (Attempts to get entire graph connected) EG : Pactual = 1-((P-k)!)^2 DDHV : Pactual = 1 – ((w-t)!)^2/(P-2k)!P! CPS : Pactual = m/n

Desirable Node Degree Desired node degree is discussed in the context of network connectivity, network capacity and energy consumption by controlling transmission power. The node degree is controlled by adjusting the transmission power. Higher node degree requires higher transmission power, which increases the energy consumption. All we have to do is crank up the power, right?

No! With a high node degree, the network connectivity increases, but the interference between the neighboring nodes increases, and therefore, the network capacity decreases. If the node degree is decreased, the connectivity decreases, which in the extreme case results in the network being disconnected. The low degree reduces the communication interference, but since the connectivity is poor the number of hops will be increased, which will decrease the network capacity. (Not to mention power consumption issues)

Desired Node Degree CON’T The optimal node degree to maximize the network capacity has been considered as a GUESSTIMATE in recent literature. The exact constant remains as an opent problem. (If each node is connected to less than.074 log n nearest neighbors then the network is asymptotically disconnected with probability 1 as n increases while if each node is connected to more than log n nearest neighbors then the network is asymptotically connected with probability approaching 1 as n increases. )

Required Local Connectivity Revisted – Theorem 2 When node Degree is 6, B is Close to 1. When node Degree is 14, Pc approaches 1 This means that even with a very small node degree most of the nodes are connected to each other. Increasing the node degree to make Pc very close to 1 causes only a small number of isolated nodes to be connected. Their Goal is to utilize the transmission power control feature to bridge the gap between network transmission range and secure transmission range.

Revisiting Random Graph Theory to re-evaluate pre-distribution schemes (Varies by k) Theorem 1 : P required = d/n’(Erdos-Renyi) Attempts to get whole graph connected *Theorem 2 : P required = a/n’ (Erdos-Renyi) Attempts to get sufficiently large Giant component For EG where P (size of key pool) = and n(network size in nodes) = : Theorem 1 : To make P actual >= Prequired, k = 214 when Prequired =.3664 Theorem 2 : To make P actual larger than Prequired =.0794, k = 91.

Comparison of this estimation for the different key ring size. Since we can reduce k by Theorem 2, the number of links an adversary could attack decreases and we can say that a reduction of k leads to a higher resilience against node capture.

DDHV

Re-evaluation of DDHV (varies as r) With r = 40 for fixed t=2, to obtain Pc =.9999 by Theorem 1, at most w = 10 can be selected. But, to create a giant component with size more than 98% by Theorem 2, w = 49 can be selected. If the memory size k is fixed, the security level is 4.9 times higher that provided by theorem 1. (w/t^2 = 49/4 vs. 10/4)

Re-evaluation of CPS Maximum network size = n = m/p By applying Theorem 2, instead of Theorem 1, we can increase the supportable network size. For example, for fixed m = 200, to satisfy Pc =.9999 by Theorem 1, p =.3664 and n = 545. But to create a giant component with size more than 98%, p =.0794 is enough and this increases the supportable network size to n = 2518.

Communication Overhead In previous section, by reducing the shared key information we could save the memory size. However after the key setup phase, the graph connected via secure links must have a very sparse node degree.

Cascade On – Ratio of Hops

Cascade off – Ratio of Hops

Transmission Range

Required Range Extention

Communication Overhead

Computational Cost FTTL – If the number of hops in the path between I and j is h, the total number of encryptions and decryptions are both h. CSN – the number of hops the unicast message traverses is always 2, so the total of 2 encryptions and 2 decryptions are used

Communication Cost FTTL is bigger than the unicast cost of CSH HOWEVER CSN trades off communication with computation

Author’s solution is a new protocol described in extension paper 1. Key setup phase is same as original. 2. After the key setup phase each node I broadcasts its own id and the id of unconnected node through itself. After the first broadcast message of each node, some of the neighboring nodes will be connected. Node I, on the other hand, checks its neighbors unconnected list to see if it can find others to help. This may not require any additional broadcast message after the first broadcasted of unconnected node list set. As time goes by, more neighbor nodes are connected.

Recall Goal of Authors : Re-visits random graph theory and uses giant component theory by Erdos and Renyi to show that even if the node degree is small, most of the nodes in the network can be connected. The relationship between connectivity, memory size and security to show that they can reduce the amount of memory required or improve security by trading off a very small number of isolated nodes.

Conclusion Showed that they could reduce the amount of memory required or improve security by trading-off a very small number of isolated nodes. Simulation shows that communication overhead does not increase significantly even after reducing the node degree Showed that nodes can dynamically adjust their transmission power to establish secur links with the targeted networked neighbors Proposed an efficient path-key identifcation algorithm and compared it with existing schems