The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 8, 2013.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Keeping the Smart Grid Secure.  A smart grid delivers electricity from suppliers to consumers using digital technology to monitor (and optionally control)
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Key Establishment Protocols for Secure Mobile Communications A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks”, IEEE.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
DIGITAL CERTIFICATE & SSL PRESENTED BY, SWAPNA ERABATHINI.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Security of the Internet of Things: perspectives and challenges
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
1 Authentication Celia Li Computer Science and Engineering York University.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
e-Health Platform End 2 End encryption
Presentation transcript:

The Cryptographic Sensor FTO Libor Dostálek, Václav Novák

The Cryptographic Sensor Wireless sensor networks Low power consumption In the past, finding alternative cryptographic algorithms

The Cryptographic Sensor The proposed solution Each of us carry a number of things equipped with cryptographic processors (credit cards, mobile phones, passports, ID cards etc.) What if such a processor connect to a node of wireless sensor network? Such processors today produced in millions, and thus they have a low price The solution is to convert the energy-intensive cryptographic operations from the microcontroller of WSN to the cryptographic processor. Not store important cryptographic assets to FALSH memory of node of WSN, but in the cryptographic processor.

The Cryptographic Sensor The proposed solution For the first experiments we connect a smart card to the node of WSN We connected smart card like are connected sensors to the node of WSN. We obtained The Cryptographic Sensor

The Cryptographic Sensor Cryptographic operations Operations before deploying WSN node (personalization of cryptographic sensor). Operations during security initialization of node into WSN. Operations when regular communication node in WSN.

The Cryptographic Sensor Energy demands - Personalization Personalization of cryptographic sensor performs during the sensor is connected to an external power source. For operation the node in the WSN is not relevant. During personalization will into a cryptographic sensor load: Public key of certification authority. Pair public and private key of cryptographic sensor. Certificate of public key of cryptographic sensor. Secret key for secure messaging - secure communication between a node and its cryptographic sensor. Optionally additional secret key for secure communication between crypto-graphic sensor and base station of WSN. This communication can be useful, for example in the case of a renewal certificate of the certification authority.

The Cryptographic Sensor Energy demands - Security Initialization During security initialization node uses cryptographic sensor. Outside the security initialization cryptographic sensor is switched off. Frequency of initialization is of the order of days, weeks or months depending on the specific WSN. Although, cryptographic initialization is energy intensive (< 25 mWs) and due to the fact that during the life cycle of the sensor is activated a few times, so the total share of the consumption of the sensor will be negligible.

The Cryptographic Sensor Energy demands - Current communication Public key cryptography don't use. Cryptographic operations does not increase the current state of energy intensity (the cryptographic sensor is off).

Used cryptographic protocol 1. The neighbors shall exchange their cryptographic sensor’s certificates of public keys (certificates are stored in the cryptographic sensors during its initialization). 2. Both neighbors verify the received certificate by the public key of certification authority stored in the cryptographic modules during their personalization. 3. Nodes generate random numbers and encrypt it by public key of neighbor. The result sign by its private key. 4. Nodes exchange results of previous step. 5. Nodes verify arrived message: (a) verify digital signature of neighbor, (2) decrypt content of message by its private key. 6. Nodes derived from decrypted content: secret session cryptographic keys, initialization vectors and shared secret for MAC calculation from received random numbers.

The Cryptographic Sensor Nodes with cryptographic sensors and nodes without cryptographic sensors Node with a cryptographic sensor can report an event to prove the authenticity of the supplement information (e.g. MAC). The base station can subsequently ask sensor node equipped with cryptographic sensor of proof of authenticity of the information (e.g.. MAC)

The Cryptographic Sensor Sensor nodes with cryptographic provide guaranteed information

The Cryptographic Sensor What we are solving with now? How many nodes must be equipped with cryptographic sensor to get information that the event undoubtedly occurred? May be nodes with cryptographic sensor randomly scattered in WSN? The aim is to minimize the consumption of all components sensors. On the one hand, more efficient measurement the values and on the other hand found nearby power-optimized cryptographic algorithm

The Cryptographic Sensor Senzors Procesor Senzors Procesor Cryptographic procesor Battery Pack

The Cryptographic Sensor Debuger for sensors procesor Master Sensor

Q & A {libor.dostalek,