LEDS:Providing Location –Aware End-to-End Data Security in Wireless Sensor Networks By Prasad Under Esteemed Guidences Of; Prof Mr.A.Nagaraju.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Joint work with Xinran Wang, Sencun Zhu and Guohong Cao Dept. of Computer Science &
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
Security in Wireless Sensor Networks
Cryptography and Network Security
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Hiral Chhaya CDA 6133.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Network Security Introduction
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Energy-Efficient Protocol for Cooperative Networks.
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Security of the Internet of Things: perspectives and challenges
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Jamming for good: a fresh approach to authentic communication in WSNs
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

LEDS:Providing Location –Aware End-to-End Data Security in Wireless Sensor Networks By Prasad Under Esteemed Guidences Of; Prof Mr.A.Nagaraju

1.Introduction Definition: A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants

Characteristics of Sensor: 1.Asensor is a device, such as a photoelectric cell, that receives and responds to a signal or stimulus 2.WSNs usually consist of a large number of ultrasmall devices are called sensors. 3.sensors are low-cost battery-powered devices 4.sensors have limited energy resources, computation,memory, and communication capacities.

Security threats in WSNs: 1.Data Confidentially : In WSNs, the attacker could compromise multiple nodes to obtain their carried keying materials and control them.This type of attack could lead to severe data confidentiality compromise in WSNs. 2.Data Authenticity and Availability: The attacker may use compromised nodes to inject bogus data traffic in WSNs This type of attack could lead to severe both data authenticity and availability. 3.Selective Forwarding Attack: Lastly, the attacker could also use compromised nodes to launch a selective forwarding attack, in which case compromised nodes selectively drop the going- through data traffic and, thus, data availability can be severely damaged

Existing System: 1.Due to the resource constraint, most of the proposals are based on Symmetric cryptography and only provide data authenticity and/or confidentiality in a hop-by-hop manner 2.existing security designs are highly vulnerable to many types of Denial of Service (DoS) attacks such as report disruption attacks and selective forwarding attacks

Proposed System: 1.End-to-end encryption/ authentication is considered less feasible, particularly in a WSN consisting of a large number of nodes 2.In this paper, we propose an integrated security design providing comprehensive protection over data confidentiality, authenticity, and availability. Our design establishes a location-aware end-to-end data security (LEDS) framework in WSNs

First, we propose a novel location-aware multifunctional key management framework LEDS then efficiently binds the location (cell) information of each sensor into all types of symmetric secret keys owned by that node

Second, LEDS provides end-to-end security guarantee.Every legitimate event report in LEDS is endorsed by multiple sensing nodes And is encrypted with a unique secret key shared between the event sensing nodes and the sink. Furthermore, the authenticity of the corresponding event sensing nodes can be individually verified by the sink. Event node Sink node Unique key Note: unique secret key shared between node and sink

Third, LEDS possesses an efficient en-route false data filtering capability to deal with the infamous bogus data injection attack Advantage: Effective en-route filtering of bogus data packets also results in significant energy savings as unnecessary forwarding is eliminated. Last, LEDS provides high-level assurance on data availability by dealing with both report disruption attack and selective forwarding attack simultaneously

Advantages of LEDS: 1. By taking advantage of the broadcast nature of wireless Links, LEDS adopts a one-to-many data forwarding approach, which is fully compatible with the proposed security framework. That is, all reports in LEDS can be authenticated 2.By multiple next-hop nodes independently so that no reports could be dropped by single node (s). Thus, LEDS is highly robust against selective forwarding attack as compared to the traditional one-to-one forwarding approach used by existing security designs

Data Security Requirements in WSNs The requirements of data security in WSNs are basically the same as those well defined in the traditional networks, that is,  Data confidentiality: Data should be accessible only to authorized entities  Authenticity: Should be genuine  Availability: Should be always available upon Request to the authorized entities

End to End vs Hop by Hop  Hop by Hop security design suitable for uniform wireless network.  Where as end to end communication is a dominant technique because data of interest are usually generated from the event happing area and transmitted,all the way to the sink. Existing data report security designs in wsn: To protect data authentication in wsn is:  To generate a valid report, T nodes that sense the event should first agree on the content of the event report, and in order to be forwarded by intermediate nodes and accepted by the sink, a valid report should be collaboratively endorsed (usually through Message Authentication Codes (MACs)) by these T nodes.  and the value of T is a system parameter

In the past two years, a few schemes have been proposed to design suitable key management schemes based on this approach, including  Statistical En-Route Filtering (SEF),  Interleaved Hop-by-Hop Authentication (IHA), and  Location-Based Resilient Secrecy (LBRS). LBRS is the most recently proposed scheme, which aims to solve the problems identified in the two previous schemes (SEF and IHA), and is a major improvement over these two schemes. In both SEF and IHA, compromising T nodes could break down the whole scheme. That is to say, after compromising T nodes, the attacker can then freely forge events “appearing” at arbitrary locations without being detected. In LBRS, the damage caused by node compromise is reduced due to the adopted location-key binding mechanism.

Once a node in a certain area is compromised, the attacker can disrupt any event report from that area from being forwarded to the sink thereafter by simply contributing a wrong MAC to the final report. Since the en-route filtering allows intermediate nodes to drop packets with false MACs, such reports will be rejected on their way to the sink because of the presence of the wrong MAC(s). On the other hand, with the common one-to-one forwarding approach, a compromised node can also drop any data report sent by its downstream nodes. Since the received report can only be verified by the compromised node at that point, there is no way for other nodes in its vicinity to distinguish such malicious dropping from legal dropping due to failing to pass the endorsement verification. As the number of compromised nodes increases, the resulting damage will increase drastically

LEDS mechanism: 1.System Assumption:  In LEDS, we consider a large-scale uniformly distributed WSN that monitors a vast terrain of interest via a large number of static sensor nodes  We assume that an approximate estimation on the size.  Once deployed, each node is assumed to be static and can obtain its geographic location via a secure and suitable localization Scheme  Once an event happens, the sensing nodes agree on a synthesized report, which is then forwarded toward the sink  We assume that every sensor node has a unique id

2.Threat Model:  We assume that the attacker could compromise multiple nodes chosen arbitrarily and furthermore assume that, if the node is compromised, all the information it holds will also be compromised  We also assume that the attacker can eavesdrop on all traffic, inject packets, and replay older packets.  The attacker can take full control of compromised nodes and thus can manipulate compromised nodes to drop or alter messages going through them. On the other hand,  we assume that there is a short bootstrapping phase right after network deployment during which no sensor node is compromised.

3.Design Goal:  LEDS seeks to provide end-to-end data security, as well as en-route bogus data filtering in WSNs.  we focus on the data such as event reports that are generated by the sensing nodes and transmitted from the sensing area to the sink  Goals are: 1.Provide end-to-end data confidentiality and authenticity 2. Achieve a high-level of assurance on data availability Be resilient against report disruption attacks and selective forwarding attacks and Be able to early detect and drop bogus reports by Using en-route filtering. 3.Realize all the security goals in a single integrated design without relying on any other security infrastructures.

Notation and Terms: we use the following notation and terms  N : is the network size.  n : is the number of nodes within one cell.  u, v, z, and m : are the unique ids of sensor nodes.  I u : is the index of node u’s home cell.  l : is the side length of a cell.  K u : is the unique secret key shared between u and sink.  K Iu : is the cell key shared among the nodes in the same cell I u.  K Iu;Iv : is the auth key shared between nodes in cell I u and nodes in cell I v.  H : is for the pseudorandom functions.  M : is the event report to be protected.  C : is the encrypted report.  T : is the number of endorsements included when generating a valid report.  t : is the minimum number of endorsements to validate a report.  p : is a large prime number

Geographic virtual grid:  A geographic virtual grid is a virtual geographic partition of the target terrain, which divides the terrain into multiple square cells.  The parameters of a geographic virtual grid consist of a reference point and the cell size.  we assume that there is only one static sink in the WSN. The size of a cell is defined by l, which is the side length of the cell. A cell is uniquely indexed by its center’s location.

Home cell, event cell  The cell that a node, say, u, is located in after network deployment is called the home cell of u, denoted as I u, and I u = (x 1 ; y 1 ) when its location is (x 1 ; y 1 ).  We call a cell an event cell when a certain event of interest happens in that cell

Report-forward route.  In LEDS, an event report is relayed from the event cell to the sink in a cell-by- cell basis along its report-forward route.  A report is always relayed between adjacent cells1 toward the sink The report- forward route of node u therefore consists of all the cells that are intersected by the line segment that connects the center of I u and the sink Report-auth cell  A cell is called a report-auth cell of node u if it belongs to u’s report-auth area, and every node in this cell shares an authentication key with u.

Report-auth area  The report-auth area of a node u consists of two parts,  1.D ownstream report-auth area and  2.Upstream report-auth area  The downstream report-auth area of u is defined to be all the cells that are farther to the sink than I u,  whereas the upstream report auth area consists of all the cells that are closer to the sink than I u and have any part that falls into the sector area

Scheme Overview The proposed LEDS scheme consists of two major components: 1.Location-aware key management framework: In LEDS, each node stores three different types of location-aware keys: 1) A unique secret key shared between the node and the sink that is used to provide node-to-sink authentication. 2) A cell key shared with other nodes in the same cell that is used to provide data confidentiality. 3) A set of authentication keys shared with the nodes in its report-auth cells that are used to provide both cell-to-cell authentication and en-route bogus data filtering

2.End-to-end data security mechanism Data confidentiality:  In LEDS, every event report is encrypted by the corresponding cell key of the event cell.  As the cell key is solely shared among nodes of the event cell and the sink Data authenticity: 1) Each report is endorsed by multiple sensing nodes, and the endorsements can be individually authenticated by the sink.  2) Each report is also authenticated in an interleaved cell-by-cell manner along the report-forwarding route.

Data availability: 1) Be robust against report disruption attacks:  The encrypted report is divided into a number of unique shares  Each share is independently generated by a participating node using its unique secret key shared with sink.  A predefined number of MACs are then computed over all the shares using cell-to- cell authentication keys. 2) Be robust against selective forwarding attacks:  Using cell-to-cell authentication keys guarantees that each report can be verified simultaneously by multiple next-hop nodes at any point in the route

Protocol Details: Location-Aware Key Management Framework: Before network deployment, the network planner prepares a geographic virtual grid of the targeted terrain with Reference point (x 0 ; y 0 ) cell size l and Based on the total number of nodes in the network N, cell size l, and the average number of nodes in each cell n 0, the network planner further decides the values of T and t: The former is the number of endorsements included when generating a valid report, and the latter defines the minimum number of correct endorsements to validate a report.