Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Group #1: Protocols for Wireless Mobile Environments.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Wireless Sensor Network Security Anuj Nagar CS 590.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
Key management in wireless sensor networks Kevin Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
The Sybil Attack in Sensor Networks: Analysis & Defenses
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Energy-Efficient Monitoring of Extreme Values in Sensor Networks Loo, Kin Kong 10 May, 2007.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Lecture 24 Wireless Network Security
Ad Hoc Network.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Security in Wireless Sensor Networks by Toni Farley.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Security of the Internet of Things: perspectives and challenges
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Net 435: Wireless sensor network (WSN)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Wireless Sensor Networks (WSN’s) Security Lecture 13
Presentation transcript:

Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley

Paper Introduction [Sli] S. Slijepcevic, M. Potkonjak,V. Tsiatsis, S. Zimbeck, M.B. Srivastava. On communication Security in Wireless Ad-Hoc Sensor Networks, Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02) June , 2002 Pittsburgh, Pennsylvania, USA

Research Contributions ©Assess communication security threats in SN ©Separate security based on sensitivity level of data -> efficient resource management ©Location-based scheme protects rest of network when parts are compromised

Approach ©Goal: Minimize security related energy consumption ©Principle: Data items must be protected to a degree consistent with their value ©3 types of network data and associated threat  Mobile code 4Malicious code can change network behavior in unpredictable ways  Locations of sensor nodes 4Acquiring this information may make physical location determination easier than w/ radio location  Application specific data 4Specific to security requirements of application (assumed low threat in this study)

WSN Architecture ©SensorWare (UCLA & Rockwell Science Center)  Localized Algorithms: Nodes only exchange messages within immediate neighborhood. One node aggregates data and sends to gateway node (proxy between user and network).  Local Broadcast: Used for communication.  Code Mobility: Supports mobile code. 4Do not need to keep all applications on node at all times 4Applications needed may not be known at deployment 4For reconfiguration after deployment

Security Threats ©Security requirements of threats in model  High: Insertion of malicious code to destroy or gain control of the network  Medium: Interception of location messages: attacker gains knowledge of node’s physical location  Low: Interception of application specific messages (confidentiality) ©Inject false messages  Incorrect information to user  Sleep deprivation torture

Communication Security Scheme ©Private key cryptography w/ group keys  Content of all network messages encrypted  Group keys (as opposed to pairwise) work with current network architecture (uses multicasting) ©Access to security API through SensorWare ©Assumes all nodes can access message content ©Various algorithms vs single algorithm w/ adjustable parameters  Single algorithm chosen as it takes less space

Keys ©All nodes share initial set of master keys  Set size based on expected network life span 4Known cyphertext attack  Dynamic key establishment won’t work 4Nodes do not keep track of neighbors 4Cannot guarantee all nodes get new key  One key active at any time 4Index of current key in master list is selected by pseudorandom generator w/same seed on each node 4Periodic, synchronous key changing

Encryption & Security Levels ©RC6 encryption algorithm  Adjustable parameter: # of rounds  More rounds = more security = more overhead ©For each data type: corresponding security mechanism  Level I (mobile code)  Level II (location information messages)  Level III (application specific messages)

Security Levels ©Keys for 3 levels derived from master key ©To access network, a user needs  Set of master keys  Pseudorandom number generator  Seed ©Level I  Mobile code messages are much less frequent  Can use stronger encryption w/ more overhead

Security Levels ©Level II  Locations of sensor likely to be in every message 4Means high overhead, esp. w/strong encryption 4Uses medium strength encryption (?)  Use location based keys for encryption 4Common keys within extended “cells” 4Isolates parts of the network 4Nodes must know exact location 4Uniform cell shape simplifies which cell a node is in 4Hexagonal cells ensure max 3 keys

Security Levels

©Level III  Lots of application specific messages  Weakest encryption strength  Lower computational overhead  MD5 hash of master key

Implementation ©Using RC6 on Rockwell WINS sensor nodes ©Confirmed observation on # of rounds increase in computational overhead ©Rounds for levels I & III (% decreased overhead)  Level I: 32  Level III: 22 (23%) ©Same consumed energy as scheme with one encryption level  More Level II & III messages  Shift in security focus

Implementation

Issues ©Gaining control of one node grants access to all 3 things needed for accessing the network:  Set of master keys  Pseudorandom number generator  Seed ©Node synchronization must be exact to change master keys ©Knowledge of exact location needed for Level II is not practical if nodes are mobile