Applied cryptography Project 2. 2CSE539 Applied Cryptography- 2005 A demo Chat server registration Please enter a login name : > Alice Please enter the.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
By Md Emran Mazumder Ottawa University Student no:
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security Issues In Sensor Networks By Priya Palanivelu.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Applied Cryptography for Network Security
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Secure Ad-Hoc Network Eunjin Jung
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Sensor Network Security through Identity-Based Encryption
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Wireless Sensor Networks
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security of the Internet of Things: perspectives and challenges
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Security Issues.
SPINS: Security Protocols for Sensor Networks
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Cryptography and Network Security
Presentation transcript:

Applied cryptography Project 2

2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the certificate file name: > c:\cert.cer Congratulations Alice! You have registered with the chat server Logging into the server Please enter login name: > Alice Welcome Alice!

3CSE539 Applied Cryptography A demo AliceBob 1.Add Contact 2.Chat Enter your choice: > 1 Enter contact name: Bob Bob has been successfully added to you contact list 1.Add Contact 2.Chat Enter your choice: > 2 Enter contact name: Bob Alice :Hi Bob Bob: Hello Alice has added you to her contact list Alice: Hi Bob Bob: Hello

Sensor Network Security Prepared by: Smitha Satish For CSE 539 ‘05

5CSE539 Applied Cryptography What is a sensor network? Consists of spatially distributed sensors Sensors work cooperatively Used to monitor or detect phenomena at a particular location Sensor node has sensing, data processing and communication components Resource constrained, limited battery

6CSE539 Applied Cryptography Applications of sensor networks Environmental monitoring – great duck island Video surveillance Traffic monitoring Air traffic control RoboticsCars Home monitoring Industrial and manufacturing automation.

7CSE539 Applied Cryptography Security in sensor networks Control Node NodeNode Base Station Internet Sensors Communication link between sensors Insecure Communication links Bio sensor networks with security requirements Data confidentiality Data authentication Data availability Data integrity Data Freshness

8CSE539 Applied Cryptography Sensor node characteristics Vulnerability of nodes to physical capture Lack of a-priori knowledge of post- deployment configuration Lower battery Limited memory resources Limited bandwidth and transmission power Impracticality of public key cryptosystems

9CSE539 Applied Cryptography Attack model Eavesdropping Loss of privacy of sensed data Denial of service Sensor node compromise

10CSE539 Applied Cryptography Aspects of sensor network security Cryptography Key management Secure routing Location aware routing Secure data integration

11CSE539 Applied Cryptography Key distribution - requirements Secure node-to-node communication Addition of legitimate nodes Prevent unauthorized nodes No prior knowledge of deployment Low computational and storage requirement

12CSE539 Applied Cryptography Single network wide key Use shared network wide key and bootstrap pair- wise keys and append a MAC Advantages: Minimal storage requirements Minimal storage requirements No need for key exchange or discovery No need for key exchange or discovery Only symmetric encryption can be used Only symmetric encryption can be used Resistant to DoS Resistant to DoSDisadvantages: Single node compromise leads to network compromise Single node compromise leads to network compromise

13CSE539 Applied Cryptography Pre-deployed pair-wise key Every node shares unique symmetric key with every other node Advantages: Resilience to node capture Resilience to node capture Compromised keys can be revoked Compromised keys can be revoked No need for key exchange or discovery No need for key exchange or discovery Only symmetric encryption can be used Only symmetric encryption can be usedDisadvantages: High storage requirements High storage requirements No scalability No scalability

14CSE539 Applied Cryptography The one with Trent Sensor nodes authenticate to trusted base station which provides link key to the pair Advantages: Resilience to node capture Resilience to node capture Compromised keys can be revoked Compromised keys can be revoked Small memory requirement Small memory requirementDisadvantages: Base station is target for compromise Base station is target for compromise No scalability No scalability You need protocols for key exchange or discovery You need protocols for key exchange or discovery

15CSE539 Applied Cryptography Asymmetric cryptography Use asymmetric keys to perform symmetric key exchange Elliptic curve cryptography Advantages: Resilience to node capture Resilience to node capture Compromised keys can be revoked Compromised keys can be revoked Fully scalable Fully scalableDisadvantages: Requires asymmetric key hardware Requires asymmetric key hardware Denial of service Denial of service Node replication Node replication