A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.

Slides:



Advertisements
Similar presentations
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Advertisements

Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Anonymous Path Routing Protocol in Wireless Sensor Networks Jang-Ping Sheu* §, Jehn-Ruey Jiang* and Ching Tu* National Central University* and National.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Author: Hangyang Dai and Hongbing Xu
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Key agreement in wireless sensor network
Chi Zhang, Yang Song and Yuguang Fang
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON MOBILE COMPUTING 김진석

 Introduction Security and Key Management in WSNs  Overview of LAKE  Key Management in LAKE  Security Analysis and Performance Evaluation  Discussion and Conclusion Contents

 WSN Thousands of Resource-Limited Nodes Without Infrastructure Unattended, Hostile Environment Battlefield, Homeland Security Monitoring Network Vulnerability to Malicious Attacks Need of Security  Key Management Base for Encryption, Authentication How to Set Up Keys to Protect Connections between Nodes Link Layer Key and Transport Layer Key Introduction

 LLK One-hop Connection Between Neighbor Shared LLK for Secure Link Layer Connection Vulnerability to Node Compromise Attack Secrets in Compromised Node is used to derive Secret Shared by Non-compromised Nodes Compromised Can be Failure Point of Infrastructure Large Memory Requirement Certain Level of Security, Connectivity Introduction

 TLK Multi-hop Connection Between Nodes TLK for End-to-end Security Memory Requirement Increases When Network is Large Each Node Must Preload N-1 Keys Relaxed Security Requirement LLK between any pair of Neighboring Nodes Saving Memory Based on LLK Infrastructure, Negotiate TLK over Multi-hop Path On-demand TLK Negotiation Vulnerability to Node Compromise Attack Multi-hop Path can be Large Introduction

 Previous Work Global Key -> Centralized Key Distribution Distributed, LLK Using Intersection of Shared Secret of Each Node Key Predistribution (Random, Probabilistic Key Agreement) Deterministic LLK Scheme Location Based LLK Scheme t-Degree Polynomial for Key Establishment Introduction

 two-LAyer Key Establishment For Establishment of LLK and TLK Nodes are in 2-dimensional Space (Logical) Trivariate Polynomial is Predistributed Used to Establish Keys Neighbors are Pre-loaded with Correlated Secrets Called Shares, Derived from Trivariate Polynomial Proper Degree t assures Resilience to the Node Compromised Attack 3 Phase : Share Predistribution, Direct Key Calculation, Indirect Key Negotiation Overview of LAKE

 Share Predistribution Polynomial Coefficients are in Finite Prime Field Symmetric 2 Credential for each Nodes -> Univariate Polynomial Node u (u1, u2), v (v1, v2) One Common Credential -> Key Calculation Overview of LAKE

 Using Deployment Information N1 non-overlapping Cells, N2 Nodes for each Cells 2 Dimensional Space Coordinate (n1, n2) is used for Credentials c1 [N2+1,N1+N2] [1,N2] Assumption Gaussian Node Distribution in Cells When Direct Key Calculation is unable, Indirect Key Negotiation can be done by Using underlying Routing protocol Correctly Routes Key Negotiation Messages over Multi-hop Path Overview of LAKE

 Share is Pre-Distributed  Direct Key Calculation LAKE

 Indirect Key Negotiation Using Level 2 Neighbor and Level 1 Neighbor Intermediate Agent Node Case : (v1, v2) (u1, u2) Agent : (v1, u2), (u1, v2) LAKE

 LLK Neighbors in Radio Radius Direct Key Calculation Between Neighbors Indirect Key Negotiation Between Nodes with Deployment Error  TLK Dynamic Establishment of TLK (On Demand) Similar to LLK Establishment Direct Key Calculation for Level 2 Neighbors Using Underlying Routing Protocol for Deployment Error Secure Link Two Nodes Already have Shared Key No more than 1 Agent Node Needed. LAKE

 Metrics Resilience to the Node Compromise Attack Node Compromise Attack is Unavoidable Reducing Additional Key Exposure Probability Local Secure Connectivity Probability that two Neighboring Nodes Establish a Direct Key (Portion of Neighbors have Direct Keys) Energy Consumption of Multihop Routing, Indirect Key Negotiation Security Analysis and Performance Evaluation

 Metrics Memory Cost How many memory units per node are needed Polynomial Share Memory Requirement Computational Overhead Overhead in Calculation of Direct Keys LAKE : Efficient Symmetric Key Technique Security Analysis and Performance Evaluation

 Memory Cost Security Analysis and Performance Evaluation

 Additional Key Exposure Probability Security Analysis and Performance Evaluation

 Local Connectivity Security Analysis and Performance Evaluation

 Computational Overhead Security Analysis and Performance Evaluation

 LAKE : t-Degree Polynomial Based Scheme  Sensor Nodes in 2-dimensional Space  Efficiently Establishes LLK and TLK  More Secure, Lesser Memory Use Security to Node Compromise Attack Compared with Conventional Schemes  Energy Efficient Due to the Location-based Deployment Neighbors can Calculate Key Directly, not Multi-hop Conclusion

 Higher Dimensional Space Higher Dimensional Multivariate Polynomial Node Identification : k indices t-Degree (k+1)-variate Polynomial Same Approach for PIKE, HyperCube Memory Cost is higher than LAKE Given same amount of Memory Resource, LAKE achieves a Higher Security Level Discussion