Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed EzzEldin.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Applied Cryptography for Network Security
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Key management in wireless sensor networks Kevin Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Aggregation in Sensor Networks
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
.Sense A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command Screenshots We present.Sense, an end-to-end security framework for.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Security in Wireless Sensor Networks by Toni Farley.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Author: Hangyang Dai and Hongbing Xu
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Weichao Wang, Bharat Bhargava Youngjoo, Shin
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Key agreement in wireless sensor network
Introduction to Wireless Sensor Networks
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148

Wireless Network Keys Management Communication Security between sensor node Because of memory and computation constraint in WSN use symmetric keys for encryption and decryption  sensors use common shared key to encrypt and decrypt  common shared keys are pre-distributed or computed by specific scheme The Globus Toolkit 4 Programmer's Tutorial Borja Sotomayor, University of Chicago, Department of Computer Science. Copyright © 2004, 2005 Borja Sotomayor

Wireless Network Keys Management Key establishment schemes Definition of key establishment: The algorithm or method for sensors to setup (or exchange) their common shared key for communication data Main requirements on key establishment schemes: 1.Availability : The network service is available without limitation with key establishment 2.Authenticity: Ability for verifying that the message sent by a node is authentic. 3.Confidentiality : The key establishment technique should protect the disclosure of data to unauthorized parties. 4.Integrity : No falsification of data during transmission. Key Pre-distribution in Wireless Sensor Networks when Sensors are within Communication Range Sushmita Ruj, Amiya Nayak and Ivan Stojmenovic

Wireless Network Keys Management WSN symmetric key establishment steps: 1.Key pre-distribution: Preload keys into each sensor nodes before WSN deployment. 2.Shared-key discovery: Setup connection between two sensor nodes in their communication range by finding common shared key. 3.Path-key establishment : establishment of communication path and path key between two unconnected sensor nodes. Path: linked nodes chain between two nodes without direct connection Path key: Common shared key used by the linked nodes in path to transfer message B S E C F D K G Key sb Key be Key bc Key SD Key ef Key fg Key gd Key kd Key fk

Wireless Network Keys Management WSN symmetric key establishment steps: 1.Key pre-distribution: Preload keys into each sensor nodes before WSN deployment. B S E C F D K G {2, 3, 4, 5, 9} {5, 7, 4, 9 1} {3, 8, 1, 0 7} {6,2, 8, 9 0} {3 7, 9, 2, 4} {5, 7, 4, 9 1} {9, 2, 6, 3 1} {1, 6, 4, 7 8}

Share key ? Wireless Network Keys Management WSN symmetric key establishment steps: 2. Shared-key discovery: Setup connection between two sensor nodes in their communication range by finding common shared key. B S E C F D K G {2, 3, 4, 5, 9} {5, 7, 4, 9 1} {3, 8, 1, 0 7} {6,2, 8, 9 0} {3 7, 9, 2, 4} {5, 7, 4, 8, 4} {9, 2, 6, 3 1} {1, 6, 4, 7 8} Share key ?

no ! Wireless Network Keys Management WSN symmetric key establishment steps: B S E C F D K G {2, 3, 4, 5, 9} {5, 7, 4, 9 1} {3, 8, 1, 0 7} {6,2, 8, 9 0} {3 7, 9, 2, 4} {5, 7, 4, 8, 4} {9, 2, 6, 3 1} {1, 6, 4, 7 8} Yes, 4,9 Yes 8 Yes 4,7 2. Shared-key discovery: Setup connection between two sensor nodes in their communication range by finding common shared key. Yes 1,7

Wireless Network Keys Management WSN symmetric key establishment steps: 3. Path-key establishment : establishment of communication path and path key between two unconnected sensor nodes. B S E C F D K G {2, 3, 4, 5, 9} {5, 7, 4, 9 1} {3, 8, 1, 0 7} {6,2, 8, 9 0} {3 7, 9, 2, 4} {5, 7, 4, 8, 4} {9, 2, 6, 3 1} {1, 6, 4, 7 8} 4, 5, 9 8 4, 7 1,7

Wireless Network Keys Management WSN symmetric key establishment steps: B S E C F D K G Key sb Key be Key bc Key SD Key ef Key fg Key gd Key kd Key fk 3. Path-key establishment : establishment of communication path and path key between two unconnected sensor nodes.

Wireless Network Keys Management WSN symmetric key establishment steps: 1.Symmetric key establishment with Polynomial in finite field. B S E C F D K G Id =7 I8 = 9 Id = 9 Id = 15 Id = 3 Id = 9 Id = 11 Id = 13

Wireless Network Keys Management WSN symmetric key establishment steps: 1.Symmetric key establishment with Polynomial in finite field. B S E C F D K G Id =7 I8 = 9 Id = 9 Id = 15 Id = 3 Id = 9 Id = 11 Id = 13 What is common key ?

Wireless Network Keys Management WSN symmetric key establishment steps: B S E C F D K G Id =7 I8 = 9 Id = 9 Id = 15 Id = 3 Id = 9 Id = 11 Id = 13 What is common key ? 1.Symmetric key establishment with Polynomial in finite field.

Wireless Network Keys Management WSN symmetric key establishment steps: B S E C F D K G Id =7 I8 = 9 Id = 9 Id = 15 Id = 3 Id = 9 Id = 11 Id = 13 What is common key ? 1.Symmetric key establishment with Polynomial in finite field.

Wireless Network Keys Management WSN symmetric key establishment steps: 1.Symmetric key establishment with Polynomial in finite field. Each node can make security communication with other nodes in its communication range

Wireless Network Keys Management Triple Key Distribution What is triple key distribution?  a common key discovery scheme among 3 sensor nodes Y X Z Common triple shared key Y X Z

Wireless Network Keys Management Triple Key Distribution Why triple key distribution?  path key establishment  verifying the relayed message in path is authentic  detect fault/ malicious nodes K{s, c, b} BSCDK Key SCKey BKKey CBKey KD K{c, b, k} K{b, k, d}

Wireless Network Keys Management Triple Key Distribution How triple key is distributed?  any three full connected nodes share an unique common key  any three string connected nodes share an unique common key Two schemes: A.full connected triple keys distribution B.String connected triple keys distribution

Wireless Network Keys Management Triple Key Distribution (full connected triple nodes) Triple nodes that share an unique triple key: BCS, BCE, ECK, EFK, FGK, DGK Y X Z Common triple shared key B S E C F D K G Key sb Key be Key bc Key SD Key ef Key fg Key gd Key kd Key fk Key be Key EK Key KG Key CS

Wireless Network Keys Management Triple Key Application (full connected triple nodes) K{s, e, c} BS E C F DK G Key SC Key SE Key CG Key BG Key BKKey CBKey KD Key bc Key GK Key EBKey FD Key EC Key FK K{c, e, b}K{b, f, k}K{k, f, d} K{c, b, g} K{b, k, g} C compare the message relayed by B to the sent message. Are they same? Yes? Done! No? Node B is in trouble, report!

Wireless Network Keys Management Triple Key Distribution (String connected triple nodes) B S E C F D K G Key sb Key be Key bc Key SD Key ef Key fg Key gd Key kd Key fk Key be Triple nodes that share an unique triple key: SBEBCKCEFEFKFGDKDGEFG SBC BEFCKFECKFKDCKDKFG Y X Z Common triple shared key

Wireless Network Keys Management Triple Key Application (String connected triple nodes) K{s, c, b} BSCDK Key SCKey BKKey CBKey KD K{c, b, k} K{b, k, d}

Wireless Network Keys Management Triple Key Application (String connected triple nodes) K{s, c, b} BSCDK Key SCKey BKKey CBKey KD K{c, b, k} K{b, k, d} C: does node B correctly transfer my message to node K? C compare the message relayed by B to the sent message. Are they same? Yes? Done! No? Node B is in trouble, report!

Wireless Network Keys Management Analysis of triple key scheme Security analysis: a compromised intermediate node possibly refuses or relay fake data frame. Because of acknowledge mechanism, its behaviour is monitored, found and kicked out of the network. SYD Key {?, S, Y}Key {S, Y, D} Does node Y relay my message? No  node Y stopped work, broadcast to whole WSN Yes  compare the relayed message. is the relayed message same as I sent? No  node Y is compromised, broadcast to kick off Y

Wireless Network Keys Management Several possible triple key establishment algorithms Symmetrical polynomial for triple key computation x, y, z are the ID of each node in the triple nodes X=10, y=11, z=12  85186

Wireless Network Keys Management Triple key management in WSN? a)A wireless sensor network with n nodes b)The possibility for any two nodes to setup direct link is p c)Possible average number of triple keys in each node S full connected triple nodes String connected triple nodes

Wireless Network Keys Management Triple key in cluster based network

Wireless Network Keys Management Triple key in cluster based network WSN network nodes density = D Deployment area = S Communication radius = r Cluster based WSN Number of cluster headers C is a constant number, describes the WSN nodes deployment overlap level >1 Average nodes number in one cluster Suppose the possibility of link between any two nodes in same cluster is P, we have:

Wireless Network Keys Management Triple key in cluster based network string connected triple nodes Average number of triple keys for each node