Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
Trust relationships in sensor networks Ruben Torres October 2004.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Digital Signatures and Hash Functions. Digital Signatures.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Chapter 1 – Introduction
IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Complexity of Network Synchronization Raeda Naamnieh.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Aggregation in Sensor Networks
Cryptography, Authentication and Digital Signatures
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Chapter 21 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security (CS435) Part One (Introduction)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Security in Wireless Sensor Networks by Toni Farley.
Key Management Network Systems Security Mort Anvari.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Fall 2006CS 395: Computer Security1 Key Management.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Information and Network Security
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed

 Introduction  Problem statement  Background  System Model  Adversary Model  GossiCrypt  Data Encryption Algorithm  Key refreshing Algorithm  Experiment results  Conclusion

Other Layers | Physical Layer Ensuring that sensor-collected data are accessed only by authorized entities has been viewed mostly as a secondary concern source sensor sink symmetric Key Data“abcd” Encrypted data symmetric Key Data“abcd” Encrypting data at their source sensor node, with a symmetric key shared with the sink, is a straightforward confidentiality mechanism. adversary However, An adversary can actively exploit the poor physical protection of nodes as it would be too costly and thus unrealistic to make them tamper- resistant It is relatively easy for an adversary to physically access the node memory contents, and extract the symmetric key used for data encryption. Such an attack is vastly simpler than a cryptanalytic one against the keys. In fact, the adversary could progressively compromise keys of numerous nodes, and eventually be able to decrypt a significant fraction of, if not all, data produced by the WSN.

 The paper concerned with sensor data confidentiality in such a setting, where cryptographic keys can be physically compromised.  It focus on a novel type of adversary we term parasitic: it seeks to exploit a WSN, rather than disrupt, degrade, or prevent the WSN operation.

 The WSN comprises N sensor nodes, each with a unique identity Si, and a network sink performing data collection and key refreshing.  Each node Si shares a symmetric key, Ki, ө,with the sink, and knows the public key, PuK ө, of the sink. The sink is equipped with all Ki, ө.  Beyond these end-to-end, sensor-to-sink, associations, nodes may share symmetric keys with their neighbors, to enable link-layer security primitives or for other security purposes System Model

 We describe the data of interest with the help of two parameters, T and ө ; the user seeks to collect data:  From a fraction 0<1 of the WSN nodes,  Over a period of T seconds, for each node Sj, for j =1,..., [§N].  The actual values of T and can vary. T can range from a short period, t0, for a single sensor measurement, to a sufficiently long period for a comprehensive measurement collection. In general, T = kt0, with k > 0 an integer. Similarly, § = 1/N System Model Cont.

1. Seeks to obtain the WSN data collected according to the parameters § and T. 2. Can be physically present, at each point in time, only at a much smaller fraction of the area covered by [§N] sensor nodes. 3. Can physically access data stored at sensor nodes and retrieve their cryptographic keys. 4. Can be mobile i.e., compromise different sets of nodes over different time intervals. “Mobile” traditionally refers to virtual moves (in terms of compromising system entities); here, it also represents physical moves of the adversary. 5. Can compromise in the above-described manner at most one sensor per τ seconds. We assume τ <<T. Adversary Model

 GossiCrypt aims at ensuring confidentiality, that is, preventing any unauthorized access to data collected by a WSN.  It does not seek to protect data coming from every single sensor, but rather intends to fulfill the following property, for some protocol- specific constant 0 < Δ< 1: ΔT−Confidentiality: Data collected from a WSN comprising N nodes are ΔT−confidential if the adversary cannot obtain all measurements performed by more than [ΔN] sensor nodes over a given time interval T.

1. Source node, Si: a. Generate a nonce n for the communication with sink ө. b. Calculate H = MAC(Ki, ө, m, n, Si). c. Encrypt m, n,H with Ki, ө to obtain ciphertext σi = {m, n,H}Ki, ө. d. Transmit packet pi = σi, Si to the first relaying node Sj on pathSi, ө. Data Encryption Algorithm

2. Relaying node, Sj : a. Upon receipt of a packet pi, generate a random number x є [0, 1]. If x > q, relay pi to the next relaying node Sk on pathSj, ө, or to ө. Otherwise, b. Generate ciphertext σj = {pi}Kj, ө. c. Append own identity Sj to σj. d. Relay packet pj = σj, Sj to the next relaying node Sk along pathSj, ө, or to ө. Data Encryption Algorithm Cont.

3. Sink ө : a. Upon receipt of a packet pk, retrieve Kk, ө, the key shared with Sk, and decrypt k. If the source cleartext,m, n,H, is obtained, go to (c). Otherwise, b. Obtain ciphertext σ l and Sl. Decrypt l with Kl, ө. Repeat successively for all Sl that re-encrypted the packet, till obtaining the source clear-text m, n,H. c. Determine if n was previously seen. If so, discard the packet. Otherwise, d. Compute H ’ = MAC(Ki, ө, m, n, Si). Discard the packet if H’ ≠ H. Otherwise, deliver m to the WSN user. Data Encryption Algorithm Cont.

1. Source node, Si: a. Upon an event of RGen( λ r), generate a new key K’i, ө ; wait for the time till the next data report. b. Upon a data report to be returned, delay the report to be combined with the next one and generate a nonce n for the communication with sink ө. c. Calculate H = MAC(Ki,, flag,K0i,, n, Si). d. Encrypt flag,K’i, ө, n,H with Ki, ө, to obtain ciphertext σ i = {flag,K’i, ө, n,H}Ki, ө. e. Transmit packet pi = σ i, Si to the first relaying node Sj on pathSi, ө. 2. Relaying node, Sj : Identical to the operation for GossiCryptE Key refreshing Algorithm

Sink ө : 3. Sink ө : a. Perform the steps (3).(a)-(b), to obtain the clear-text flag,K’i, ө, n,H. b. Determine if n was previously seen. If so, discard the packet. Otherwise, c. Calculate H’ = MAC(Ki, ө, flag,K’i, ө, n, Si). If H’ ≠ H, discard the packet. Otherwise, replace Ki, with K’i, ө. Key refreshing Algorithm Cont.

 The paper showed that, for any protocolor application- specific objective 1/N, the confidentiality of the sensed data can be safeguarded with probability almost equal to one.  analytic and experimental values show that even very short sequences (e.g., T = 5t0) of measurements originating from a single source node can be protected with probability fast approaching one. This is achieved thanks to the GossiCrypt en-route encryption, resulting in particularly robust operation even when approximately 40% of the nodes are compromised by the adversary.

 The paper evaluation shows that GossiCrypt can prevent the breach of WSN confidentiality in a wide range of settings.  Even though the adversary could obtain solitary or sparse measurements, their analysis and simulations show that GossiCrypt prevents the compromise of a meaningful set of measurements over a period of time with probability going to one.  The most intriguing feature of GossiCrypt lies in its ability of defending the WSN data confidentiality with simple and low cost mechanisms.