1 A Secure Communication Protocol For Wireless Biosensor Networks Masters Thesis by Krishna Kumar Venkatasubramanian Committee: Dr. Sandeep Gupta Dr. Rida.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Multirate adaptive awake-sleep cycle in hierarchical heterogeneous sensor network BY HELAL CHOWDHURY presented by : Helal Chowdhury Telecommunication laboratory,
Trust relationships in sensor networks Ruben Torres October 2004.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Introduction to Wireless Sensor Networks
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Thermal Aware Routing in Implanted Sensor Networks Masters thesis by Naveen Tummala Advising Committee: Dr. Sandeep Gupta Dr. Arunabha Sen Dr. Partha Dasgupta.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Security of the Internet of Things: perspectives and challenges
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks 1. Introduction 2. Security in Body Area Networks: Need and Approach Krishna.
Wireless Sensor Networks 5. Routing
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Introduction to Wireless Sensor Networks
Aggregation.
An Overview of Security Issues in Sensor Network
Presentation transcript:

1 A Secure Communication Protocol For Wireless Biosensor Networks Masters Thesis by Krishna Kumar Venkatasubramanian Committee: Dr. Sandeep Gupta Dr. Rida Bazzi Dr. Hessam Sarjoughian

2 Overview Introduction Problem Statement System Model Proposed Protocols Security Analysis Implementation Conclusions & Future Work

3 Biomedical Smart Sensors Miniature wireless systems. Worn or implanted in the body. Prominent uses: Health monitoring. Prosthetics. Drug delivery. Each sensor node has: Small size. Limited memory processing communication capabilities Environment (Human Body) sensors Base Station Communication links

4 Motivation for biosensor security Collect sensitive medical data. Legal requirement (HIPAA). Attacks by malicious entity: Generate fake emergency warnings. Prevent legitimate warnings from being reported. Battery power depletion. Excessive heating in the tissue.

5 Problem Statement Direct communication to the BS can be prohibitive. To minimize communication costs, biosensors can be organized into specific topologies. Cluster topology is one of the energy-efficient communication topologies for sensor networks [HCB00]. Traditional cluster formation protocol is not secure. We want to develop protocols which allow for secure cluster formation in biosensor networks.

6 Cluster Topology Cluster head Cluster Cluster Member Base Station

7 Traditional Cluster Formation Protocol CH1CH2 CH Environment Weaker signal

8 Security Flaws HELLO Flood and Sinkhole Attack 1 23 Malicious Entity acting as a SINKHOLE Weaker signal CH2 CH1 The sinkhole can now mount selective forwarding attacks on the biosensors in its “cluster”. Malicious entity can mount a Sybil attack where it presents different identities to remain CH in multiple rounds.

9 Security Flaws contd.. Node with surrounding tissue at above normal temperature. Node with surrounding tissue at normal temperature. tissue Node with dead battery Network Partitioning.  Malicious entity sending bogus messages to sensor and depleting its energy.  Malicious entity having unnecessary communication with a sensor causing heating in the nearby tissue.

10 System Model ADVERSARIES: Passive: Eavesdrop on communication and tamper with it. Active: Physically compromise the external biosensors. Temperature sensor Glucose sensor

11 Trust Assumptions The wireless communication is broadcast in nature and not trusted. The biosensors do not trust each other. Base Station is assumed not to be compromised.

12 Key Pre-Deployment Each biosensor shares a unique pair-wise key (master key) with the BS. This key is called NSK We do not use NSK directly for communication, we derive 4 keys from it (derived keys): Encryption KeysMAC Keys K N-BS = H(NSK,1)K’ N-BS = H(NSK,2) K BS-N = H(NSK,3)K’ BS-N = H(NSK,4)

13 Biometrics Physiological parameters like heart rate and body glucose. Used for securing/authenticating communication between two biosensors which do not share any secret. Usage Assumptions: Only biosensors in and on the body can measure biometrics. There is a specific pre-defined biometric that all biosensors can measure.

14 Issues with Biometrics Biometric value data-space is not large enough. Possible Solutions: Combine multiple biometric values. Take multiple biometric measurements at each time. Limit the validity time of a biometric value. Biometric values at different sites produce different values. Solution Proposed in Literature: These differences are independent. [Dau92] Can be modeled as channel errors. [Dau92] Fuzzy commitment scheme based on [JW99] used to correct differences. Can correct up to two bit errors in the biometric value measured at the sender and receiver.

15 Biometric Authentication BMT ST 6 Time-Period Measure biometric: BioKey Generate data Compute Certificate: Cert [data] = MAC ( KRand, data), γ γ = KRand  BioKey Send Msg: data, Cert [data] Measure biometric: BioKey’ Receive Msg: data, Cert [data] Compute MAC Key: KRand’ = γ  BioKey’ f (KRand’) = KRand Compute Certificate MAC And compare with received: MAC (KRand, data) SENDER RECEIVER Biometric Measurement Schedule

16 Centralized Protocol Execution Node j  All: ID j, NonceN j, MAC(K’N j – BS, ID j | NonceN j ), Cert[ID j, NonceN j ] CH p  BS: ID j, NonceNi, MAC(K’N j – BS, ID j | NonceN i ), CH p, SS, E (KCH-N), MAC(K’CH p – BS, CH p | SS | E (KCH-N) | Cntr) BS  Node j : CH p, E (KCH-N), Cntr’, MAC(K’BS-N j, CH p | NonceN j | Cntr’ | E (KCH-N)) CH 1 Sensor Node Base Station CH 2CH 3 CH1 CH 2 CH 3

17 Distributed Protocol Execution CH j  All: CH j, NonceCH j, E (Ktemp), Cert[ID j, Cntr, NonceCH j ], λ λ = BioKey  KRand Node k  CH z : ID k, MAC (Ktemp, ID k | NonceCH z | Cntr | CH z ) CH 1 CH 2 CH 3 Sensor Node

18 Extensions Distribute keys based on attributes. Allows efficient data communication. The BS distributes the keys. For centralized ABK, sent during cluster formation. For distributed separate step needed.

19 Security Analysis (Passive Adversary) Hello Flood and Sinkhole Attack Centralized: Malicious entity does not have appropriate keys to pose as legitimate CH. Distributed: Malicious entity cannot compute biometric certificate.

20 Security Analysis (Passive Adversary) Sybil Attack No entity can become part of network without having appropriate keys. Identity Spoofing Cannot pose as BS, no pair-wise (derived) keys. Cannot pose as CH, no keys to authenticate data to BS. Cannot pose as sensor node, cannot measure biometric to fool CH.

21 Security Analysis (Active Adversary) CH compromise Centralized: Security policy at BS to limit number of sensor nodes in a cluster. Distributed: Need intruder monitoring scheme. Sensor Node compromise Intruder monitoring scheme needed for both protocols.

22 Implementation We have implemented the two cluster formation protocols and their extensions. The implementation was done on the Mica2 sensor motes. We used TinyOS sensor operating system for writing our programs. For security primitives TinySec used.

23 Implementation contd.. Encryption – SkipJack Message Authentication Code – CBC-MAC We had 4 sensor nodes 3 CH and 1 BS in our implementation. We simulated two main attacks on our implementation, both of which failed: HELLO Flood attack. Identity spoofing of sensor node to infiltrate the network.

24 Comparison Security adds a overhead to the protocol. We compared overhead in terms of energy consumption. To compare the protocols, we analyzed them using the communication model given in [HCB00]. E trans = E tx * k + E cx * k * d 2 E recp = E rx * k Node ID = 8 bitsNonce = Counter = 128 bits Key = 128 bitsSignal Strength = 16 bits E trans = E recp = 50 nJ/bitE cx = 100pJ/bit/m 2 Number of Nodes = Sensor-BS distance = 0.75 m Inter-sensor distance = 0.1 m MAC size = 64 bits

25 Security Overhead Comparison of Secure (without extension) and Non-secure Cluster Formation Protocols (CH = 5%)

26 Extension Overhead Comparison for Secure Cluster Formation Protocols with their extensions (CH = 5%)

27 Conclusions & Future Work Protocols developed successfully prevent many of the potent attacks on the traditional cluster formation protocol. Biometric based authentication used for ensuring authentication without previous key exchange. Biometrics not traditionally random and schemes are needed to randomize them. Better error correction schemes are needed which can correct larger differences in measured biometrics.

28 Reference [JW99] Ari Juels and Martin Wattenberg. “A fuzzy commitment scheme” [Dau92] J. Daugman, “High Confidence personal identification by rapid video analysis of iris texture”, IEEE International Carnahan Conference on Security Technology, pp 50-60, [LGW01] L. Schwiebert, S. K. S. Gupta, J. Weinmann et al., “Research Challenges in Wireless Networks of Biomedical Sensors”, The Seventh Annual International Conference on Mobile Computing and Networking, pp , Rome Italy, July [HCB00] W. Rabiner Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proceedings of the 33rd International Conference on System Sciences (HICSS '00), January 2000.