Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
Using Channel Diversity to Improve Security for Wireless Sensor Networks Matthew J. Miller University of Illinois at Urbana-Champaign.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Research Trends in MANETs at CIIT, Islamabad Mohammad Mahboob Yasin, PhD COMSATS Institute of Information Technology.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Topic 1: Sensor Networks (Long Lecture) Jorge J. Gómez.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
© 2007 Levente Buttyán Security and Privacy in Upcoming Wireless Networks Key establishment in ad hoc networks exploiting - physical contact; - mobility.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Intrusion Tolerance for NEST
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign April 27, 2006

2 The Promises of Sensor Networks The SweetThe Sour Wireless links for easy, quick deployment Tapping the channel is easier Cheap and numerous devicesDifficult to avoid physical compromise Small and energy-efficient devices Resource constraints on cryptography “Every sweet has its sour” -Ralph Waldo Emerson

3 How Key Distribution Fits In Tapping the channel  Keys give confidentiality against eavesdropping  Keys avoid unauthenticated data injection Physical compromise  Distribution should be resilient to node compromise Resource constraints  Use symmetric key cryptography as much as possible

4 Problem Statement After deployment, a sensor needs to establish pairwise symmetric keys with neighbors for confidential and authenticated communication Applications  Secure aggregation  Exchanging hash chain commitments (e.g., for authenticated broadcast)

5 Design Space Every node deployed with global key Minimal memory usage, incremental deployment is trivial  If one node is compromised, then all links are compromised Separate key for each node pair One compromised node does not affect the security of any other links  Required node storage scales linearly with network size

6 Related Work Each sensor shares a secret key with a trusted device (T) [Perrig02Winet]  T used as intermediary for key establishment  T must be online and may become bottleneck Key Predistribution [Eschenauer02CCS]  Sensors pre-loaded with subset of keys from a global key pool  Tradeoff in connectivity and resilience to node compromise  Each node compromise reduces security of the global key pool

7 Related Work Transitory key [Zhu03CCS]  Sensors use global key to establish pairwise key and then delete global key  Node compromise prior to deletion could compromise entire network Using public keys (e.g., Diffie-Hellman)  High computation cost  But, is it worth it when this cost is amortized over the lifetime of a long-lived sensor network?

8 Related Work Broadcast plaintext keys [Anderson04ICNP]  If an eavesdropper is not within range of both communicating sensors, then the key is secure  Assumes very small number of eavesdroppers  No way to improve link security if eavesdroppers are in range  We propose using the underlying wireless channel diversity to greatly improve this solution domain

9 High Level View of Our Work Bob Alice Eve Channel 1 Channel 2

10 High Level View of Our Work Given c channels: Pr(Eve hears Bob’s packet | Alice hears Bob’s packet) = 1/c If Alice hears M of Bob’s packets, then the probability that Eve heard all of those packets is (1/c) M As (1/c) M → 0: The packets Alice heard can be combined to create Alice and Bob’s secret key

11 Threat Model Adversary’s primary objective is to learn pairwise keys  Can compromise node and learn its known keys  Can overhear broadcast keys Adversary’s radio capability is similar to that of sensors [Anderson04ICNP]  Receive sensitivity  One radio Multiple adversary devices may collude in their knowledge of overheard keys  Collusion in coordination of channel listening is future work Denial-of-Service is beyond the scope of our work

12 Protocol Overview Predeployment  Give each sensor a unique set of authenticatable keys Initialization  Broadcast keys to neighbors using channel diversity Key Discovery  Find a common set of keys shared with a neighbor Key Establishment  Use this set to make a pairwise key that is secret with high probability

13 Phase 1: Predeployment Each sensor is given λ keys by a trusted entity  Keys are unique to sensor and not part of global pool  λ presents a tradeoff between overhead and security The trusted entity also loads the Merkle tree hashes needed to authenticate a sensor’s keys  O(lg N) hashes using Bloom filter authentication  O(lg λ N) hashes using direct key authentication

14 Phase 2: Initialization Each sensor follows two unique non- deterministic schedules:  When to switch channels Chosen uniformly at random among c channels  When to broadcast each of its λ keys Thus, each of a sensor’s λ keys is overheard by 1/c neighbors on average  Different subsets of neighbors overhear each key Sensors store every overheard key

15 E C, E C, D, E Initialization Example AB D C E Nodes that know all of A and B’s keys: Ø = Channel 1 = Channel 2

16 Phase 3: Key Discovery Goal: Discover a subset of stored keys known to each neighbor All sensors switch to common channel and broadcast Bloom filter with β of their stored keys  Bloom filter for reduced communication overhead Sensors keep track of the subset of keys that they believe they share with each neighbor  May be wrong due to Bloom filter false positives

17 Key Discovery Example A B C A’s Known Keys B’s Known Keys C’s Known Keys A and C’s Shared Keys A and B’s Shared Keys

18 Phase 4: Key Establishment 1. Generate link key: k uv = hash(k 1 || k 2 || k 3 ) 2. Generate Bloom filter for k uv : BF(k uv ) 3. Encrypt random nonce (RN) with k uv : E(RN, k uv ) 1. Find keys in BF(k uv ) 2. Use keys from Step 1 to generate k uv 3. Decrypt E(RN, k uv ) 4. Generate E(RN+1, k uv ) u’s believed set of shared keys with v = {k 1, k 2, k 3 } uv E(RN, k uv ) || BF(k uv )E(RN+1, k uv ) k uv

19 Simulation Setup Use ns-2 simulator 50 nodes Density of 10 expected one hop neighbors By default, 15 nodes are adversaries and collude in their key knowledge By default, λ is 100 keys/sensor

20 Results: The Advantage of Channel Diversity Fraction of Links that are Secure One Channel Two Channels Number of Keys Preloaded per Node ( λ ) Just one extra channel significantly improves security

21 Results: Resilience to Compromise One Channel Two Channels ≥ 3 Channels Fraction of Nodes that are Compromised Resilient to large amount of node compromise Fraction of Links that are Secure

22 Summary Key distribution is important for sensor networks Many distinct solutions have been proposed  No “one size fits all” approach emerges Our work is the first to propose using channel diversity for key distribution  Results show significant security gains when even one extra channel is used

23 Thank You!

24 Wireless Channel Diversity Radios typically have multiple non- interfering, half-duplex channels  b: 3 channels  a: 12 channels  Zigbee (used on Telos motes): 16 channels At any given time, an interface can listen to at most one channel

25 Design Considerations Resource constrained  Energy, computation, memory, bitrate Large scale deployments  May need thousands (or more) of devices Topology may be uncontrolled  Specific device’s location unknown in advance

26 Using Path Diversity Path diversity can be used to get a small number of compromised links to zero Similar to multipath reinforcement proposed elsewhere  Node disjoint paths needed to combat node compromise  Only link disjoint paths needed to combat eavesdroppers AD B C = Secure Link = Compromised Link k1k1 k2k2 k AD = hash(k 1 || k 2 )

27 Simulation Results for Example Topology Number of Shared Neighbors Used Fraction of Links That are Compromised

28 Merkle Tree Authentication C = hash(O 1 ) A = hash(C || D) R = hash(A || B) Each sensor given R and O(lg N) other hashes O1O1 CDEF O2O2 O3O3 O4O4 AB R R = ?