S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Chris Karlof and David Wagner
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed EzzEldin.
The Sybil Attack in Sensor Networks: Analysis & Defenses J. Newsome, E. Shi, D. Song and A. Perrig IPSN’04.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
© 2007 Levente Buttyán Security and Privacy in Upcoming Wireless Networks Key establishment in ad hoc networks exploiting - physical contact; - mobility.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
Key Management in Mobile and Sensor Networks Class 17.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Cryptography and Network Security (CS435) Part Eight (Key Management)
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Author: Hangyang Dai and Hongbing Xu
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin

K ey M anagement A pproaches "Pairwise key establishment" is the fundamental security service allowing nodes to communicate in cryptographic way Due to limited resources we can't use any of: -Public-Key-Cryptography -Key-Distribution-Center used in traditional networks. Instead, we use: Key Pre(before deployment) - schemes

K ey P re-distribution S chemes Symmetric-key schemes: "one key for encryption and decryption" 1-Unique Random key. 2-Networkwide shared key. 3-Probabilistic key pre-distribution. 4-Polynomial based key pre-distribution. Public-key schemes: "one key for encryption, while the other for decryption" 1-Elliptic Curve Cryptography.

U nique R andom K ey Each node is assigned unique random key. To communicate with any node, must use its key. Introduces huge storage overhead: network of n nodes, each must store (n-1) keys.

N etworkwide S hared K ey Master/Global key used by all nodes. Compromise of even a single node would reveal the secret key and allow decryption of all traffic. One variant is to establish a set of link keys with other neighbor nodes, then erase the master key. Does not allow new nodes to be deployed.

P robabilistic K ey P re-distribution Setup server generates large pool of random keys each is assigned unique ID. Each node randomly picks subset of keys from the key pool and their Ids. Any 2 nodes can communicate with each other if share a common key.

After deployment, two nodes need to communicate, send list of key IDs they hold, and use common keys for communication. The probability of sharing at least one common key is as follows: S : key Pool size. S': Subset size at node. If don't have a common key.... need to find number of other nodes to help establish a session key ( called path key ).

This technique needs less memory and can guarantee a high probability of sharing common key between two nodes. But small number of compromised nodes will disclose a large fraction of secrets, as single key may be shared by more than two nodes. For more security, q-composite scheme is proposed, where two nodes setup pairwise key iff they share at least q-common keys.

P olynomial k ey P re-distribution The Setup server randomly generates a bivariate t-degree polynomial over finite field Fq, where f(x,y)=f(y,x). For node with id i, setup server will compute polynomial share of f(x,y)->f(i,y) which is pre-loaded for node i.

Nodes i and j, can compute common key f(i,j) as follows: -node i evaluates f(i,y) at point j gets f(i,j). -node j evaluates f(j,y) at point j gets f(j,i). Each node needs "(t+1)log q" storage places to store polynomial f(i,x). Large mathematical overhead. However, no communication overhead, as what is needed is the id of the other node.

E lliptic C urve C ryptograhy ECC is a lightweight type of public key cryptography. Usually used in heterogeneous sensor networks. Sensor network contains nodes, gateways and base-station. Gateways are powerful in terms of energy, computation and memory. Before deployment, server generates and pre-loads keys based on ECC into senosr and gateways as follows:

Sensor node is pre-loaded with: Unique id. Its own public and private keys. Public key of all gateways in the network. Gateway is pre-loaded with: Unique id. Its own public and private keys. Public key of the base station. public key of all sensor nodes in the network. Sensor nodes are randomly deployed. Gateways are deployed such that each node can hear form at least one gateway.

Each gateway Gj broadcasts message Bj to all sensor nodes. Each node selection will be based on Signal-to-Noise-Ratio. Each sensor node ni can verify the message using the public key of the gateway.

Sensor node sends a session-key request to the gateway node, holding list of its neighbors ni'. Gateway sends the ECC encrypted pairwise key between the node i and its neighbor node I'. Node i decrypts the message received.

Assuming that gateways are tamper proof. An adversary is unable to impersonate the identity of any node except by capturing it. Obviously capturing node ni reveals: Its (PUi, PRi ) Pubic key of all gateways Reveals no info of links not communicate directly with it. Capturing node does not effect the security of the rest nodes, as no reveal for private keys of other nodes.

R eferences *"A Key Management Scheme for Cluster Based Wireless Sensor Networks" 2008 IEEE/IFIP International Conference. *"Security in wireless sensor networks" communication of the ACM june 2004/Vol 47. *"Security for wireless sensor networks" Advances in information security springer. *"Analyzing the Key Distribution from Security Attacks in Wireless Sensor" Piya Techateerawat and Andrew Jennings. *"Secure Clustering and symmetric key establishment in heterogeneous wireless sensor newtorks"Research article Reza Azarderskhsh and Arash reyhani. *"Cryptography and Security in Wireless Sensor Networks" Pyrgelis Apostolos, University of Patras. *”Security and Privacy in Sensor Networks” Haowen Chan and Adrian Perrig, Carnegie Mellon University.