To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Internet Security Protocols
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Customized Network Security Protocols Cristina Nita-Rotaru and Jeffrey Seibert SPONSORED BY DOUBLE-TAKE SOFTWARE (Jan July 2009) Department of.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
TinySec: Security for TinyOS Chris Karlof Naveen Sastry David Wagner January 15, 2003
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
SPEDA 2010 – August, 23-25, 2010, Atlanta, GA, USA A. De Benedictis, A. Gaglione, N. Mazzocca Securing a Re-Taskable Sensing System Seclab Group –
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Security Issues In Sensor Networks By Priya Palanivelu.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Applied Cryptography for Network Security
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
.Sense A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command Screenshots We present.Sense, an end-to-end security framework for.
AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED SECURITY FOR MOBILE AD-HOC NETWORKS PROTOCOLS Guided By: Prof. P.R.Pardhi Presented By: Palak V. Agrawal.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
Chapter 4 Application Level Security in Cellular Networks.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Delay Aware, Reconfigurable Security for Embedded Systems Philip Brisk 2 Tammara Massey 1 Foad Dabiri 1 Majid Sarrafzadeh
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Security in Wireless Sensor Networks by Toni Farley.
Azam Supervisor : Prof. Raj Jain
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
Cryptography CSS 329 Lecture 13:SSL.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Security Of Wireless Sensor Networks
Security of Wireless Sensor Networks
Presentation transcript:

To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats Phases of the experimentation: 1 – Provide SPD functionalities to off-the-shelf smart-sensors (i.e. WSN motes) measuring environmental parameters like temperature, vibrations, etc. and test them in the laboratory 2 – Develop a monitoring application detecting abnormal operating conditions and test the overall system in a real-environment for SPD functionalities like node authentication, checksum, cryptography, etc. also by simulating SPD threats Description of the architecture and SPD-functionalities of the rail car monitoring system O b j e c t i v e The proposed cryptosystem In order to enforce security requirements at the transport level of our reference sensor network, we exploited the WM-ECC library (*) to: - implement a mechanism for key exchanging between the master and the motes based on the ECDH protocol in order to establish a shared secret key for channel encryption - achieve broadcast authentication of query messages sent by the master to the motes - achieve end-to-end encryption, integrity and freshness of query response messages sent by motes to the base station by exploiting the Skipjack cipher (*) H.Wang, B. Sheng, C.C. Tan and Qun Li, WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes, Technical report, Oct. 30, 2007 P e r f o r m a n c e A n a l y s i sSPD F u n c t i o n a l i t i e s A r c h i t e c t u r e o f t h e T e s t b e d Time overhead The cryptographic operations performed at the master and mote sides for encrypting/decrypting and digitally signing packets, produce a fixed latency (about 4 seconds) in returning the first results to the wrapper for each executed query this can certainly be acceptable in all monitoring applications where real-time requirements are not very strict. pSHIELD 2nd Review Meeting, Kjeller/Oslo (Norway) We did not consider the delays related to communications over the TCP/IP network as they depend on how the application is distributed to monitor a particular environment Enhancement of the WM-ECC Library with the implementation of the ECDH protocol (*) key_agree function Key agreement among nodes: ECDH Message signature: ECDSA An example scenario: secure query and response A monitoring system can be structured into 2 main layers: sensor network layer Physical level: is responsible of the processing of the locally generated data at the node level Transport level: controls the communication between the nodes of the network application layer Integration level: is responsible of the integration of data belonging to different sensor networks User level: executes the user distributed applications The monitoring architecture allows to manage heterogeneous networks by means of a unified interface. We adopted it to design an heterogeneous sensor network infrastructure where the heterogeneity is not only in the technology aspects but also in the different security requirements. The proposed architecture allows to cope with new security features by means of ad-hoc wrappers matching the underlying security mechanisms and protocols. MASTERMOTE