LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.

Slides:



Advertisements
Similar presentations
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Advertisements

Program Integrity Verification (PIV) in Wireless Sensor Networks (WSN) Based on Park and Shin 2005 presented by Therese Paul.
A Survey of Key Management for Secure Group Communications Celia Li.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid Rong Jiang
URSA: Providing Ubiquitous and Robust Security Support for MANET
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Security Issues In Sensor Networks By Priya Palanivelu.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, Mario Gerla Computer Science Dept. UCLA.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Applied Cryptography for Network Security
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Securing Wireless Ad Hoc Sensor Networks A research project in partial fulfillment of CS 522 University of Colorado Colorado Springs Frank Gearhart 08.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Lightweight Security Protocol T AEJOON P ARK Real-Time Computing Laboratory Department of EECS The University of Michigan “Security in Networked Embedded.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Security for Broadcast Network
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction to Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
An Overview of Security Issues in Sensor Network
Presentation transcript:

LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade

Agenda  INTRODUCTION  SYSTEM ARCHITECTURE  SECURITY ATTACKS  LIGHTWEIGHT SECURITY PROTOCOL  PERFORMANCE EVALUATION  CONCLUSION

Introduction  Small low-cost sensor devices with limited resources are being used widely to build a self- organizing wireless network for various applications like monitoring and asset surveillance  Securing the sensor network is important  Lightweight security protocol(LiSP)

LiSP The heart of the protocol is the novel rekeying Mechanism  Efficient key broadcast without requiring retransmission/ACKs  Authentication for each key-disclosure without incurring additional overhead  The ability of detecting/recovering lost keys  Seamless key refreshment without disrupting ongoing data encryption/decryption  Robustness to inter-node clock skews

The PEG framework consisting of two wireless networks, sensors and pursuers SYSTEM ARCHITECTURE

SECURITY ATTACKS  Passive attack  Active attack  DoS attack: jamming, collisions, exhaustion, vulnerabilities  Single compromised node should not be allowed to enable subversion of the entire network.

LIGHTWEIGHT SECURITY PROTOCOL  How to combine security with other services, such as routing, sensor data aggregation/dissemination, and location services?  How to make a tradeoff between security and resource consumption?

LIGHTWEIGHT SECURITY PROTOCOL Goals in protecting security-critical information from attackers:  Confidentiality  Data integrity  Access control  Availability  Key renewability and revocability

The key hierarchy for LiSP.

The LiSP architecture.

TK Management  The challenges in TK management  Acquire a new TK efficiently, securely, and reliably  Switch to the new TK without disrupting the ongoing data transmission

TK Management  The main ideas of the proposed protocol are: 1.Generate a sequence of TKs by utilizing the cryptographic one-way function. 2.Distribute each TK well before it is used for encryption/decryption. 3.Perform TK buffering in all sensors in the group. 4.Verify the authenticity of the received TK and detect/recover missing TKs using the other stored TKs.

TK Management  Control Packets 1.InitKey is used by the KS to initiate TK refreshment, and contains, t, the number of lost TKs that can be recovered; an initial TK; Trefresh, TKrefreshment interval; and MAC. The KS unicasts this packet to each group member whenever it wishes to (re)configure TK management with a given set of parameters. 2.UpdateKey is used by the KS to periodically broadcast the next TK in the key-sequence, and contains a new TK. 3.RequestKey is used by individual nodes to explicitly request the current TK in the key-sequence.

TK Management  Initial Setup On receiving the InitKey(k) packet: 1.Node K clears all previous TKs 2.Allocates a key buffer of length t (kb[t],...,kb[1]), and two key-slots 3.Computes keys, TKt+1,..., TK1, from TKt+2; 4.Stores {TKt+2,..., TK3 } and {TK2, TK1 } in the key-buffer and key-slots, respectively; 5.Activates TK1 for data encryption;and finally 6.Sets ReKeyingTimer that expires after Trefresh/2. When the timer expires, the node (1) switches the active key to TK2 (2) sets ReKeyingTimer to expire after Trefresh for future key switching.

TK Management  Re-keying On receiving the UpdateKey packet: 1.Shifts the stored TKs, that is, kb[1] to the inactive key-slot and kb[i] to kb[i-1], for 2 ≤ i ≤ t 2.Executes TK authentication and recovery on the received TK 3.If successful, copies the received TK to kb[t] else discards TK.

TK Management

 Reconfiguration The KS will reconfigure the TK management at the time of next rekeying, if 1.Existing group members have been compromised 2.All n TKs have been disclosed 3.A new node has joined the group 4.A member has explicitly requested TK, because it missed more than t TK- disclosures The required actions for each event: 1.The KS revokes compromised nodes, and if TKk−1 has been disclosed previously, discloses TKk+t+2, instead of TKk, using InitKey. This makes all previous TK-disclosures (up to TKk−1) futile. 2.KS computes a new key-sequence {TKi | i = 1,..., n}, and unicasts InitKey with TKt+2 to all members. 3.The KS performs entity authentication with the new node, and if successful, sends the current configuration via an InitKey packet. 4. The KS sends the requesting node an InitKey packet containing the current configuration.

Message Encryption/Decryption

Intergroup Communication  Under LiSP, the entire network is divided into multiple groups, each with a KS.  For intergroup communications, KSs should coordinate with one another under the control of KSN

Realization of LiSP server-side and client-side programs require:  IDS,  The entity authentication protocol  The cryptographic one-way function

The pseudocode for the KS

The pseudocode for the client

PERFORMANCE EVALUATION  The performance of TK management 1.The overheads (in both computation and communication) a node pays to renew TKs 2.The performance gain the node makes by adding reliability within LiSP  How LiSP defends itself against various attacks

The expected number of hash computations per TK-disclosure at the client node vs. pL PERFORMANCE EVALUATION

The expected number of hash computations per TK-disclosure at the client node vs. pF PERFORMANCE EVALUATION

The normalized communication cost at the client node versus t PERFORMANCE EVALUATION

Efficiency of TK Management  Transmission costs per TK-disclosure  Compare the proposed TK distribution with the scheme based on unicasts plus explicit message authentication  Transmission cost of LiSP is only 18% (in number of packets) and 22% (in number of bytes) of the unicast case Transmission Costs No. of Packets Total Cost in Bytes LiSP 0.7N 12.6N Unicast 4N 58N

Security Analyses  Any modification to the TK will be rejected by the authentication test at the receiver. Similarly, any dropped TK due to collision will be recovered before its activation  The expected computational overhead is bounded  Replay attacks will not succeed  LiSP defeats main-in-the-middle attacks  LiSP prevents attacks on data packets

CONCLUSION  LiSP makes security/energy-efficiency tradeoffs via efficient refreshment of keys  KS independently maintains the security of a group: Intrusion detection and TK management  TK management offers (i) efficient TK broadcast without relying on retransmissions/ACKs; (ii) authentication and TK recovery without incurring additional overhead; (iii) seamless TK rekeying without disrupting ongoing data traffic  Security analyses have demonstrated LiSP’s effectiveness in defeating various security attacks  LiSP’s strength lies in meeting conflicting goals of providing high-level security and maximizing energy efficiency

QUESTIONS??????

Thank You