CSCI5931-02 Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Security in Wireless Sensor Networks: Key Management Approaches
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Topic 1: Sensor Networks (Long Lecture) Jorge J. Gómez.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Author: Hangyang Dai and Hongbing Xu
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Private key
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Presented by Edith Ngai MPhil Term 3 Presentation
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks

DSN's similarity with traditional embedded wireless networks  Both include arrays of sensor nodes that are battery powered  Both have limited computational capabilities and memory, and rely on intermittent wireless communication via radio frequency and, possibly, optical links  Both include data-collection nodes, which cache sensor data and make it available for processing to application components of the network, and control nodes, which monitor the statusof and broadcast simple commands to sensor nodes

DSNs difference from traditional embedded wireless networks  Their scale is orders of magnitude larger than that of embedded wireless networks  They are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to extend the network or replace failing and unreliable nodes without physical contact  They may be deployed in hostile areas where communication is monitored and sensor nodes are subject to capture and manipulation by an adversary.

Communication Security Constraints  Power, energy and the related computational and communication limitations of nodes in this range make it impractical to use typical asymmetric (public-key) cryptosystems to secure communications

Choice to provide security  Substantially less energy is spent to communicate over smaller distances, since power is proportional to the square of the distance.  In the range of sensor capabilities we consider, symmetric-key ciphers and hash functions are between two to four orders of magnitude faster than digital signatures  Hence, symmetric-key ciphers, low-energy, authenticated encryption modes, and hash functions become the tools of choice for protecting DSN communications.

Key Management Constraints  Traditional Internet style key exchange and key distribution protocols based on infrastructures using trusted third parties are impractical for large scale DSNs  Because of the unknown network topology prior to deployment, communication range limitations, intermittent sensor-node operation, and network dynamics.  To date, the only practical options for the distribution of keys to sensor nodes of large-scale DSNs whose physical topology is unknown prior to deployment would have to rely on key predistribution.

Key Management Constraints  Keys would have to be installed in sensor nodes to accommodate secure connectivity between nodes.  However, traditional key pre-distribution offers two inadequate solutions:  either a single mission key  or a set of separate n-1 keys, each being pair-wise privately shared with another node, must be installed in every sensor node.

Key Management Constraints  The single mission-key solution is inadequate because the capture of any sensor node may compromise the entire DSN since selective key revocation is impossible upon sensor capture detection.  Pair-wise private sharing of keys requires pre-distribution and storage of n - 1 keys in each sensor node, and n(n - 1)/2 per DSN, which renders it impractical for DSNs using, say, more than 10,000 nodes, for both intrinsic and technological reasons.

Key Management Scheme  A simple key pre-distribution scheme that requires memory storage for only few tens to a couple of hundred keys, and yet has similar security and superior operational properties when compared to those of the pair-wise private key-sharing scheme.  Scheme relies on probabilistic key sharing among the nodes of a random graph and uses a simple shared-key discovery protocol for key distribution, revocation and node re-keying.

Key Management Scheme  Prior to DSN deployment, distribute a ring of keys to each sensor node, each key ring consisting of randomly chosen k keys from a large pool of P keys, which is generated off-line  Because of the random choice of keys on key rings, a shared key may not exist between some pairs of nodes.  Use of random graph analysis and simulation shows that what really matters in key pre-distribution is the shared- key connectivity of the resulting network.  For example, for a 10,000-node network, a key ring of only 250 keys have to be pre-distributed to every node

Key Distribution  Three phases  1.pre-distribution,  2.shared-key discovery, and  3.pathkey establishment

Pre-distribution phase  Consists five off-line steps:  Generation of a large pool of P keys (e.g., keys) and of their key identifiers  Random drawing of k keys out of P without replacement to establish the key ring of a sensor  Loading of the key ring into the memory of each sensor  Saving of the key identifiers of a key ring and associated sensor identifier on a trusted controller node  For each node, loading the i th controller node with the key shared with that node  Note that the key shared by a node with the i-th controller node, Kci, can be computed as Kci = EKx(ci), where Kx = K1 ⊕,..., ⊕ Kk, Ki are the keys of the node’s key ring, ci is the controller’s identity, and EKx denotes encryption with node key Kx.

Shared-key discovery phase  Takes place during DSN initialization in the operational environment where every node discovers its neighbors in wireless communication range with which it shares keys  The simplest way for any two nodes to discover if they share a key is that each node broadcast, in clear text, the list of identifiers of the keys on their key ring.  The shared-key discovery phase establishes the topology of the sensor array as seen by the routing layer of the DSN. A link exists between two sensor nodes only if they share a key

Path-key establishment phase  Assigns a path-key to selected pairs of sensor nodes in wireless communication range that do not share a key but are connected by two or more links at the end of the shared-key discovery phase  Path keys need not be generated by sensor nodes. The design of the DSN ensures that, after the shared-key discovery phase is finished, a number of keys on a key ring are left unassigned to any link.

Revocation  Whenever a sensor node is compromised, it is essential to be able to revoke the entire key ring of that node  To effect revocation, a controller node (which has a large communication range and may be mobile) broadcasts a single revocation message containing a signed list of k key identifiers for the key ring to be revoked  After obtaining the signature key, each node verifies the signature of the signed list of key identifiers, locates those identifiers in its key ring, and removes the corresponding keys (if any)

Re-Keying  Although it is anticipated that in most DSNs the lifetime of a key shared between two nodes exceeds that of the two nodes, it is possible that in some cases the lifetime of keys expires and re-keying must take place.  Re-keying is equivalent with a self-revocation of a key by a node. As such, it does not involve any network-wide broadcast message from a controller and, hence, is especially simple.  After expired-key removal, the affected nodes restart the shared-key discovery and, possibly, the path-key establishment, phase.

Resiliency to Sensor-Node Capture  Two levels of threats posed by node capture and potential countermeasures:  1. The first is that of active manipulation of a sensor’s data-inputs.  Although this threat does not necessarily require a physical attack against a sensor, it does imply that an adversary can disseminate bogus data in the DSN.  Attack cannot usually be prevented and it may not be practical, or even possible, to detect it by physical DSN surveillance (e.g., by satellite or aerial imagery)  Detecting a sensor’s data input manipulation may require data correlation analysis and data-anomaly detection, possibly off-line, by collection and processing nodes.  Requires redundant sensor coverage of deployment areas and, hence, sufficient sensor-node density in the DSN.

Resiliency to Sensor-Node Capture  2. The second level of threat materializes when a sensor node is under the complete physical control of the adversary.  In the single mission key scheme, all communication links are compromised, whereas in the pair-wise private key sharing, all n-1 links to the captured unshielded node are compromised.  In contrast, in this scheme only the k << n keys of a single ring are obtained, which means that the attacker has a probability of approximately k/P to attack successfully any DSN link

Resiliency to Sensor-Node Capture  2. The second level of threat materializes when a sensor node is under the complete physical control of the adversary.  In the single mission key scheme, all communication links are compromised, whereas in the pair-wise private key sharing, all n-1 links to the captured unshielded node are compromised.  In contrast, in this scheme only the k << n keys of a single ring are obtained, which means that the attacker has a probability of approximately k/P to attack successfully any DSN link

References  Laurent Eschenauer and Virgil D. Gligor, "A key-management scheme for distributed sensor networks", 2002