Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.

Slides:



Advertisements
Similar presentations
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Advertisements

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Trust relationships in sensor networks Ruben Torres October 2004.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORK Presented by Chetan Rana U08CO213.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
.Sense A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command Screenshots We present.Sense, an end-to-end security framework for.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Sensor Network Security
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Security of the Internet of Things: perspectives and challenges
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
SPINS: Security Protocols for Sensor Networks
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Security Of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security of Wireless Sensor Networks
An Overview of Security Issues in Sensor Network
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1

Outline Introduction Problem Formulation Related Work Key Management Module Proposed Security Platform Conclusion References 2

Introduction(1/1) Sensor networks are usually deployed in hostile environments, many of their applications require that data must be exchanged in a secure and authenticated manner. Public key cryptography is also considered to be computationally expensive for WSN. Any WSN security protocol has to be flexible and scalable enough to easily allow nodes to join or leave the network. 3

Problem Formulation(1/2) A few reasonable assumptions : 1.Sensor nodes in the network are not mobile. 2.The base station is safe and adversaries cannot compromise it. 4

Problem Formulation(2/2) Requirements for a practical WSN security platform : 1.Flexibility 2.Scalability 3.Transparency 4.Lightweightness 5.Node Capture Resistance 6.Simplicity 5

Related Work(1/3) 6

Related Work(2/3) three major approaches for key management in WSN : 1)Deterministic pre-assignment 2)Random pre-distribution 3)Deterministic post-deployment derivation 7

Related Work(3/3) 8

Key Management Module(1/4) Key establishment module establishes the following kinds of keys: 1)Pair-wise (PW) key : 2)Broadcast (BC) key : 3)Node-Base (NB) key : K : global master keyF : hash function 9

Key Management Module(2/4) 10

Key Management Module(3/4) The memory overhead of our key management module for each node can be calculated as follows: |BC|,|PW| and |NB| : size of broadcast key, pair- wise key and node-base key. d : the maximum number of neighbors each node may have. 11

Key Management Module(4/4) 12

Proposed Security Platform(1/6) This platform provides security against several types of attacks as follows :  Replay Attacks: use the increasing counter value to guarantee the freshness of the messages.  Node Capture Attacks  Denial of Service Attacks: detect unauthorized packets before delivering them to application layer for further processing and stop them from spreading into the network. 13

Proposed Security Platform(2/6) Message Modification and Impersonation Attacks: message Authentication Codes (MAC) can be used to let the receiver nodes detect any modifications of received messages from the original one.  Attacks on Confidentiality: appropriate encryption mechanisms 14

Proposed Security Platform(3/6) 15

Proposed Security Platform(4/6) 16

Proposed Security Platform(5/6) 1)Authentication, Access Control and Integrity (A): the Counter field is not required, but obviously the MAC field is needed. 2)Confidentiality (C): source and Counter fields are used in the packet format, however receiver nodes do not save the related counter values. 17

Proposed Security Platform(6/6) 3)Replay Attack Protection (R): Source and Counter fields are also necessary, but the counter value of each neighbor is kept. 18

Conclusion(1/2) post-distribution key management module allowing for the provision of several security services such as acceptable resistance against node capture attacks and replay attacks. lightweight and allows for high scalability while being easy to use and transparent to the users. 19

Conclusion(2/2) This platform is flexible enough to allow different types of security services for different types of communications among nodes. 20

References(1/2) [1] C. Karlof, N.Sastry, D. Wagner, “TinySec: Link Layer Encryption for Tiny Devices”, ACM SenSys, 2004 [2] A. Perrig, R. Szewczyk, V. Wen, D. culler, D. Tygar, “SPINS: Security Protocols for Sensor Networks”, ACM CCS, 2003 [3] Q. Xue, A. Ganz, “Runtime Security Composition for Sensor Networks (SecureSense)”, IEEE Vehicular Technology Conference, 2003 [4] S. J. S. Zhu, S. Setia, “LEAP: Efficient security mechanism for large- scale distributed sensor networks”, ACM CCS, 2003 [5] T. Li, H. Wu, F. Bao, “SenSec Design”, Institue for InfoComm Research, Tech. Rep. TR-I2R-v1.1, 2005 [6] H. Chan, A. Perrig, “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks”, Proceedings of IEEE Infocom, 2005 [7] S.Capkun, J.P. Hubaux, “Secure positioning of wireless devices with application to sensor networks”, IEEE Infocom,

References(2/2) [8] S. Ganeriwal, S. Capkun, C. C. Han, M. B. Srivastava, “Secure time synchronization service for sensor networks”, ACM WiSe, 2005 [9] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, ACM CCS, 2002 [10] H. Chan, A. Perrig, D. Song, “Random Key Predistribution Schemes for Sensor Networks”, IEEE Symposium on Security and Privacy, 2003 [11] D. Liu, P. Ning, “Establishing pairwise keys in distributed sensor networks”, ACM CCS, 2003 [12] J. Hill, et al, “System architecture directions for networked sensors”, in Proceedings of ACM ASPLOS IX, 2000 [13] Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: Proc. of the Second Usenix Workshop on Electronic Commerce, (1996) 1–11 22