LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Security in Wireless Sensor Networks: Key Management Approaches
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
IEEE Wireless Local Area Networks (WLAN’s).
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
Key management in wireless sensor networks Kevin Wang.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Version Number Authentication and Local Key Agreement Levente Buttyán Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Wireless Network Security CSIS 5857: Encoding and Encryption.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Draft-dvir-roll-security-authentication-01 and draft-dvir-roll-security-key-agreement Amit Dvir Laboratory of Cryptography and System Security (CrySyS)
Cryptography CSS 329 Lecture 13:SSL.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Presentation transcript:

LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon

Assumptions Static sensor nodes. Basestation is laptop class device. Nodes can store hundreds of bytes of keying material. Neighbors not known in advance. Adversaries can eavesdrop, inject packets, and replay old packets. Resistant to physical jamming (i.e. spread spectrum).

Design Goals Support Various Communication Patterns: Unicast Local Broadcast Global Broadcast Support In-Network Processing Data Aggregation Passive Participation Survivability Energy Efficient Avoid Message Fragmentation

LEAP Overview LEAP: Localized Encryption and Authentication Protocol Several different types of packets: Control Packets vs. Data Packet Broadcast Packets vs. Unicast Packets Query or Command Packets vs. Sensor Reading Packets. Different packet types have different cryptographic requirements.

Four Keys Leap supports four different types of keys to meet the various cryptographic requirements: Individual Keys shared with base station Group Key shared by the base station and a group of nodes Cluster Key shared by a node and it’s neighbors Pairwise shared key shared by a node and an individual neighbor

LEAP Notation is the number of nodes in the network. are principals such as communication nodes. is a family of peudo-random functions. means encrypting message s with key k. is the message authentication code of message s using a symmetric key k.

Establishing Encryption and Authentication Keys Encryption keys and Authentication keys are derived from a parent key K.

Establishing Individual Node Keys Recall: individual keys are only shared with the base station. To calculate key for node u, we calculate: where is a master key known only to the base station.

Establishing Pairwise Shared Keys (Assumptions) Nodes are not tamper resistant, but the time required to compromise a node after capture is bounded by some The key establishment phase requires some time in order to finish.

Establishing Pairwise Keys Key pre-distribution, Each node is preloaded with key Each node generates master key Neighbor Discovery At deployment, each node sets a timer to fire at Each node broadcasts a HELLO containing the node id. Each neighbor responds with an ACK containing Each node derives to verify the MAC.

Establishing Pairwise Keys Pairwise Key Establishment Each node then calculates Key Erasure When the timer fires, each node erases and all the neighbor master keys Simplification: don’t send ACK if a node has already heard an ACK. If both and are calculated, only keep one.

Establishing Pairwise Keys (Sleeping Nodes) Can establish keys with nodes that are sleeping by asking neighbors their neighbor list. or use a neighbor to do path key establishment when the node awakens. Why would you have sleeping nodes at deployment?

Performance Analysis of Pairwise Key Setup A joining node needs to verify a MAC from each neighbor and generate a pairwise key. Each neighbor needs to compute a MAC and generate a pairwise key. Communication consists of a HELLO packet and a ACK from each neighbor. Initial key storage consists of a single initial key. Final key storage conists of one key per neighbor, plus one individual key.

Security Analysis of Pairwise Key Setup As long as then the protocol is secure. HELLO packets are unverified, we can preload a group key as well in order to verify HELLO packets.

Time Slicing to Increase Security We divide node addition into m time slices, each time slice has it’s own master key. Each node is preloaded with the master key of the time slice it will be deployed in, as well as, Individual Keys for each subsequent time slice. Each node then performs the pairwise key establishment algorithm based on the time slice it’s currently on. Attacker that compromise a node within Tmin, only obtain pairwise keys established within that time slice.

Use of random number to increase security. Recall: HELLO broadcasts are unverified. Each node to be added in time slice m has a preloaded id based on a number taken from a random stream generated from a well known random function and a seed After time, an authenticated broadcast, like is used to send out and (the number of numbers in the stream). If a new node is not in the stream, it is discarded as an imposter.

Establishing Cluster Keys After pairwise keys have been setup with each neighbor, node u generates a random key, then transmits to each neighbor: Communication and storage cost is equal to the number of neighbor nodes per node.

Establishing Group Keys We could preload each node with a group key. However, this does not solve group re-keying if a node is compromised. Existing schemes have issues fitting messages into a single packet (logical tree based methods) or send too many packets (unicast methods) or require too much encryption/decryption (cluster key methods).

Authenticated Node Revocation Required for Group Re-keying Uses uTesla in order to remove node u from the network. The base station sends: When a node receives this message, it stores off the verification key, and remove pairwise keys with u and recalculates it’s cluster key if u was a neighbor.

Secure Key Distribution Encrypted with cluster keys, is recursively sent to each node down whatever routing tree exists. Each node verifies the new group key using the verification key sent in the uTesla message. The basestation should update the group key periodically (or each node should choose a new group key based on the old one ).

Local Broadcast Authentication Problem: cluster keys cannot be used for local broadcast, because they are shared with potentially compromised nodes. Each node generates a hash chain, and sends the commitment to it’s neighbors. When a node sends a message, it appends the next key (the AUTH key) unto the message. The AUTH key can be xor’ed with the cluster key for more security.

Performance Evaluation of Group Re-Keying Each neighbor node to the revoked node needs to recalculate it’s cluster keys. While sending out the group key: Each node needs to decrypt once (to get the key) = N. Each parent needs to encrypt once (at most N). Giving us a total of encryptions and decryptions per node Communication cost is similar (under worst case).

Storage Evaluation Each node stores 4 types of keys. If a node has d neighbors, it needs to store one individual key, d pairwise keys, d cluster keys, one group key, d AUTH keys and L AUTH keys of it’s own. Total number of keys to store is 3d+2+L. Note: The above total does not include any keys used if doing addition of nodes using time slicing.

Security Analysis: Survivability A compromised nodes can: Use individual key to send false sensor readings to the base station. Use pairwise and cluster keys to inject bad routing info and erroneous sensor readings to neighbors (note: must be done with the compromised nodes id, due to local broadcast authentication). Use of group key allows a compromised node access to viewing (but not sending) basestation broadcasts.

Defending against attacks on Routing Local Broadcast Authentication prevents most outsider attacks (except wormhole attacks, then only during neighbor discovery phase). Spoofing, altering or replaying routing info requires a node to hear then jam the initial message, then resend using the heard AUTH. Difficult to do, and may be overheard by the original sender.

Defending against routing attacks. HELLO flood attacks prevented since each node only accepts packets from authenticated neighbors. Sybil attacks fail due to the same reason. Note: I think both of these are foiled by the random number stream as id algorithm and/or preloaded group ids.

Implementation Implemented on TinyOS using nesC. Used RC5 for all of it’s security primitives. Found that ACKs often collided, so added a random backoff based on node density. HELLO’s also collided, so added a random (upto 3 seconds) time after deployment before sending and multiple (3 times) resends at 3 seconds. Assumed to be 12 seconds.

Implementation (continued) Added a three-way handshake for exchanging pairwise AND cluster keys: Code (without group keys or uTesla) was run on Mica2 Motes. Code space was 17.9KB ROM. RAM was based on number of neighbors.

Conclusions LEAP supports four types of keys: Individual, Pairwise, Cluster, and Group. LEAP provides authenticated local broadcast. Allows for in-network processing, while limiting the effect of compromised nodes to their immediate vicinity. LEAP prevents or increases the difficulty of many security attacks vs. sensor networks. LEAP has efficient key updating procedures and storage requirements per node are small. LEAP is feasible for current generation sensor nodes.