IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2009 -

Slides:



Advertisements
Similar presentations
International Graduate School Cottbus / IHP microelectronics Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt.
Advertisements

Security Issues in Wireless Sensor Networks -Ninad Naik.
Improving TCP over Wireless by Selectively Protecting Packet Transmissions Carla F. Chiasserini Michele Garetto Michela Meo Dipartimento di Elettronica.
“Advanced Encryption Standard” & “Modes of Operation”
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Applications of Wireless Sensor Networks in Smart Grid Presented by Zhongming Zheng.
Digital Signatures and Hash Functions. Digital Signatures.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
© ELPRO Technologies NORCAL ISA Think Wireless…Think ELRPO Wireless Gateways Smart Wireless Gateways The 21 st Century modem Frank Williams May 1, 2007.
Authors: Joaquim Azevedo, Filipe Santos, Maurício Rodrigues, and Luís Aguiar Form : IET Wireless Sensor Systems Speaker: Hao-Wei Lu sleeping zigbee networks.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
MGR: Multi-Level Global Router Yue Xu and Chris Chu Department of Electrical and Computer Engineering Iowa State University ICCAD
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Connectivity Devices Hakim S. ADICHE, MSc
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
“Fly-By-Wireless” Chris Dimoulis CS 441 Fall 2013.
RTP Encryption for 3G Networks Rolf Blom, Elisabetta Carrara, Karl Norrman, Mats Näslund Communications Security Lab Ericsson.
WEP Protocol Weaknesses and Vulnerabilities
Measuring of the time consumption of the WLAN’s security functions Jaroslav Kadlec, Radek Kuchta, Radimír Vrba Dept. of Microelectronics.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Minimum Energy Reliable Paths Using Unreliable Wireless Links Qunfeng Dong, Suman Banerjee, Micah Adler, and Archan Misra Mobihoc 2005.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Security of the Internet of Things: perspectives and challenges
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Algorithms for Big Data Delivery over the Internet of Things
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Security Of Wireless Sensor Networks
PREPARED BY: RIDDHI PATEL (09CE085)
Consideration on applying ICN to Edge Computing
Outline Using cryptography in networks IPSec SSL and TLS.
Motion-Aware Routing in Vehicular Ad-hoc Networks
Security of Wireless Sensor Networks
Internet of Things (IoT) for Industrial Development and Automation
FieldLink Process Networking Introduction
Presentation transcript:

IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems Steffen Peter, Oliver Stecklina, Peter Langendörfer

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Outline Motivation Introduction development flow System analysis Mapping process Conclusions

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Realflex project ( ) Water worksBiogas facilityRoboter cell wireless architecture for industrial automation large distance, public networks Small latency, dependability Standards, existent architecture

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Waterworks scenario

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Today’s way of handling security Shield network and define that it is secure  not realistic in wireless networks Enable “sort of miracle” security layer  mostly not right solution Patch security where a hole is assumed  often not efficient  all threads considered? Proper design of security solutions  expensive and time-consuming

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Proposed development flow

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved System Analysis Break it down -Find atomic flows of information  Data flow graph with dependencies Analyze each processing step separately -What are the requirements for this step? -Ignore dependencies at this stage Resolve dependencies -Requirements resolve over data flow

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Example Control pumps based on measured flow and pressure values –Uplink -Sensors on the field  PLC -Wireless connection to the Ethernet access point –Downlink -PLC  pumps -Wireless connection to the Ethernet access point -High integrity requirement sensorAP PLC AP pump U p l i n kD o w n l i n k

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Security properties Concealment / Secrecy Integrity Availability Authentication Authorization Accountability Non-Repudiation Security requirements vector

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Security Metric Security classAttackerAttacker toolsBudget 0No securityattack can be succeed 'by accident' 1curious hackercommon tools< 10,000$ 2 organized attacker (academic, crime) special tools < 100,000$ 3 large organized attacker (crime, government) highly specialized tools, laboratory > 100,000$ An algorithm belongs to class c if it resists all attacks from attacker groups smaller than c.  Requirement Vector =

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Proposed development flow

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Mapping Process

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved What to do if drawer is empty? Find a solution from scratch –State of the art –Good solution –Not efficient Look in neighborhood –Find close solutions –Analyze & solve the differences

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Waterworks Example Security: –Strong integrity Environment: –open field, short range wireless ( ) –One message every 30 seconds Dependability: –node life time min. one month  400mJ/operation -Information integrity > %  1/1 million

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Waterworks Example (2) Assumed no direct solution found Neighborhood: wired environment –Security requirements fulfilled by protected environment –Information integrity realized with CRC  we have no protected environment, but CRC is fine  adapt dependencies (information integrity solved) How to realize protected environment –Mapping tells us AES OFB is solution (message integrity due to pair-wise shared keys)  Test against other requirements: too high energy consumption

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Waterworks Example (3) Problem message overhead –16 bit message + 20 bit CRC encrypted with 128 bit AES Solution: take one AES key for 3 messages  40 bit ciphertext  Still security of 128 bit AES OFB  Information integrity as in wired environment  Dependency requirements fulfilled

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Conclusions Suitable security and safety needs consideration of –Environment –Dependability requirements –Security requirements  Huge complexity, expensive development flow Proposed semi-formal engineering methodology is a first answer –Requirements and potential solutions are cataloged as result of a formal analysis process  Allows reproducible problems and reusability of answers –Mapping process as efficient way to integrate applications Fuzzy requirements (environment) still biggest challenge for a full automatic integration process

IHP Im Technologiepark Frankfurt (Oder) Germany © All rights reserved Thank You Questions?