1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Trust relationships in sensor networks Ruben Torres October 2004.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
1 Complexity of Network Synchronization Raeda Naamnieh.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Multimedia & Networking Lab
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Aggregation in Sensor Networks
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Version Number Authentication and Local Key Agreement Levente Buttyán Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Security in Wireless Sensor Networks by Toni Farley.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Weichao Wang, Bharat Bhargava Youngjoo, Shin
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Draft-dvir-roll-security-authentication-01 and draft-dvir-roll-security-key-agreement Amit Dvir Laboratory of Cryptography and System Security (CrySyS)
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Presentation transcript:

1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and systems 2008 Li Chen Chia-Chang Hsu Chin-Laung Lei Course : Wireless and Mobile Networks Teaching Instructor : Yuh-Shyan Chen Presenter : 蔡議德

2 Outline Introduction Leap+ Improved protocol Security analysis Simulation Conclusion

3 Introduction Sensor networks are often deployed in various situations where different security requirement must be satisfied for different situation. For example, it uses in hostile environment such as battlefield. We don’t want to leak out private data while some node are being compromised by the adversary. The data confidentiality must be hold.

4 Introduction Cryptography is often used to protect and secure the communications in the sensor network. We normally rely on keys to achieve this goal, so how to manage the keys in the networks is a very challenge problem. Since the wireless sensor node are limited in battery power, computing ability, and memory storage, it is reasonable to use the symmetric key cryptography as the fundamental tool to manage the keys.

5 Introduction We can preload each node the secret key with all the other nodes or its immediate neighbor only. It’s an issue to discuss a trade-off between efficiency and security. Now we choose the scheme which preloading each node the secret key with its immediate neighbor only. By this scheme, knowing which nodes are the immediate neighbors becomes important since the primary goal in the sensor network is to build up the pairwise key among neighbor nodes, so the secure communication can be preformed.

6 Leap+ Zhu, Setia, and Jajordia introduced the localized encryption and authentication protocol (LEAP+) [S. Zhu and S. Setia, 2006]. It use four types of keys to accomplish network-wide, group, and pairwise keying capabilities, it uses an preloaded master secret key to establish the pairwise keys with its immediate neighbors, and the master secret key will be delete after the node completes its neighbor discovering. Base on the assumption that the time for the adversary to compromise a node is longer than the time for a node’s neighbor discovering.

7 Leap+ LEAP+ uses a pseudo random function (PRF) to compute most of the keys. We define a PRF as in [O. Goldreich, S. Goldwasser, S. Micali, 1986] it is a deterministic function ƒ: {0, 1} n →{0, 1} n which is efficient (i.e. computable in polynomial time) and takes two inputs x, k are random n-bit stream. ƒ cannot be distinguished from random functions by any probabilistic polynomial-time algorithm that asks and receives the value of a function at arguments for its choice.

8 Leap+

9 The basic pairwise key establishment consists of four steps: Key Predistribution : The base station generates an initial key K IN and loads it into the new node u, the node will calculate its master key K u by using it is node id K u =F K IN (u).

10 Leap+ Neighbor Discovery : Right after u is being deployed, it tries to discovery its neighbors by broadcasting a HELLO message that contains its id. It also starts a timer that will fire after T min. and trigger key erasure phase. Node u waits for each neighbor v to respond to the HELLO message with an ACK message that includes its id, v. The ACK of v is authenticate by its master key K v, since u knows K IN, it can also derive K v and verify v’s identity.

11 Leap+

12 Leap+ Pairwise Key Establishment : Node u compute its pairwise key with v as K uv = F K v (u). Node v can compute K uv in the same way.

13 Leap+ Key Erasure : When the timer fires after T min, node u erases K IN and neighbors’ master keys, and keeps its own master key. Note that the paper said that node u does not have to authenticate itself to node v. because any further messages from node u authenticated with K uv will prove node u’s identity. After these phases the establishment of pairwise key between u and v is done.

14 Leap+ Unlike the random predistribution scheme we have discussed, LEAP+ will allow every legal node u (nodes have K IN ) to establish a pairwise key with each of its neighbors, after u erase the K IN, compromise u will only get the pairwise keys for node u’s neighbors, and no additional pairwise key can the compromised node establish. Moreover, the compromise of one node will not leak out any information about other pariwise keys in the network.

15 Leap+ It is obvious that LEAP+ will suffer from HELLO flood attacks, although LEAP+ has proposed to use the global key that shared by every node in the network. Adversary only need to compromise one node to launch this attack. Another possible threat is the replay attack. Because node u doesn’t authenticate itself to v immediately, adversary can copy the message that is encrypted by Kuv, and use the id of node u to broad an HELLO message near v, and send back the message encrypted by Kuv back to node v, node v will accept another u as its legal neighbor.

16 Leap+ Base on the above analysis, we first introduce an authenticating step to eliminate the possibility to use the replay attack. Furthermore, we minimize the area size that an adversary can launch the HELLO flood attacks by utilizing the deployment information.

17 Improved Protocol Network Model

18 Improved Protocol Adversary Model : . Eavesdroping messages . Clone the node

19 Improved Protocol Key Establishment . Establishing Individual Keys . Establishing Pairwise Keys . Establishing Cluster Keys

20 Improved Protocol Establishing Individual Keys Every node needs to keep an individual key that is only shared with the based station. This key is generated and preloaded into each node prior to its deployment. We can build up the individual key for each node as: ƒ K (u 1 ||u 2 ). Here we refer K as a master key that only known to the base station. In our scheme, the base station can save the memory storage by not keeping a list of individual keys but only an id list, when it needs to communicate with the node, it can derive the individual keys.

21 Improved Protocol Establishing Pairwise Keys –Secret Predistribution –Neighbor Discovery –Pairwise Key Establishment –Key Erasure –Node Authentication –Neighbor Grid List Refresh

22 Improved Protocol Secret Predistribution : Before the deployment, the base station will determine the coordinate for each node u: ID u = (g u, id u ), the coordinate includes the location of the deployment area g u, and the node id id u, which is unique in current grid, Base Station also generate an initial key K IN and loads it into the node u, it will calculate its master key K u by using it is node id K u = ƒ K IN (ID u ).

23 Improved Protocol Neighbor Discovery : After u is been deployed, u broadcasts an HELLO message to find out its immediate neighbor, at the same time u starts its timer that will fire after time T min. Neighbor v who receives the HELLO message will check the neighbor grid list to find out whether u is adjacent or not, if true then replies with the ACK message, ACK: N 1, MAC(K v, ID u ||ID v ). Notice that we use a nonce N 1 to prevent the replay attack, which we will describe in the node authentication phase. For the node that doesn’t have K IN, it cannot derive the correct K v from id v to calculate the correct MAC value of ID u ||ID v, and this false MAC will be detect by u, so the adversary cannot impersonate as a legal neighbor

24 Improved Protocol Pairwise Key Establishment : Node u computes the pairwise key K uv with neighbor v as K uv = ƒ K v (u 2 ). Node v can compute K uv in the same way.

25 Improved Protocol Key Erasure : When u’s timer fires after T min, u erase the initial key K IN and every master key K v of its neighbors, but keeps its own master key K u.

26 Improved Protocol Node Authentication : u broadcast an authentication message to authenticate itself to the neighbors, with the specific location of u: AUTH: ID u, MAC(k uv, N 1 ). If u is an illegal user (doesn’t have K IN ), it cannot derive the correct K uv to calculate the correct MAC value of N 1, and will be detect by v, so the adversary cannot impersonate as a new joining node.

27 Improved Protocol Neighbor Grid List Refresh : Node u and v will launch a procedure to sum up the neighbor grid that appears during the neighbor discovery phase, the maximum number of grids one node can be adjacent with is three, so if there are four different grids appears in the neighbor grid list, the grid with least neighbor nodes should be discarded.

28 Improved Protocol

29 Improved Protocol Establishing Cluster Keys When the sensor nodes needs to broadcast the messages to the immediate neighbor such as the aggregated data or routing information data, pairwise key is not suitable to achieve the goal of one-to- many communication pattern. In order to protect the broadcasting message from being eavesdropped, each node needs to share a unique key with its immediate neighbors; this key is used to encrypt the broadcasting message. We call this key as the cluster key.

30 Improved Protocol To construct the cluster key is simple, after the node u completes the pairwise key establishment, u first generate a random key K cu, then encrypt it with the pairwise keys shared with each neighbor, and transmit it the encrypted key to neighbors v 1, v 2 …, v m.

31 Security analysis Replay Attack HELLO Flood Attack Node Cloning Attack

32 Security analysis Replay Attack : Every message exchanged during the key establishment phase except the HELLO message is different. Adversary catches the ACK message cannot replay it to other nodes’ HELLO message since every node has an unique id. Adversary catches the AUTH message cannot authenticate itself to others because the nonce in AUTH will be different for each neighbor.

33 Security analysis HELLO Flood Attack : A laptop-class adversary can simply send HELLO message to a large radio range in high frequency to waste the CPU cycle, and fill up the queue in the node, furthermore, adversary can convince these nodes that he is their next hop neighbor, and misdirect the routing in the network.

34 Security analysis Node Cloning Attack : Any new joining node possess the correct K IN can verify this binding relation. According to the assumption that K IN will no longer exist in the network after the new joining node has finish the neighbor discovery phase and delete K IN, adversary cannot forge this relation by the wrong cell id- node id pair, thus the only thing he can do is to use the correct cell id- node id pair, and the comparable master key and put it into the cloning node, thus limit the effect area the adversary can reach consequently.

35 Security analysis

36 Simulation

37 Simulation

38 Conclusion We have discussed the security concern of LEAP+ and present an improvement key establishment scheme for the static sensor network. The most benefit of our scheme is to build up a binding relation between the id and the location; this relation can be verify only by the legal user, the attacks due to identity fraud or compromised secrets can only work in the restricted area or fail to launch an attack at all. This property can increase the robustness of the sensor network, makes our scheme suitable to deploy in a hazardous area.

39 Reference S. Zhu and S. Setia, “ LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Transaction On Sensor Networks, vol. 2, No. 9, pp , November, 2006.