Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,

Slides:



Advertisements
Similar presentations
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Advertisements

Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
Source: KSII Transactions On Internet And Information Systems Vol. 3, No. 2, April 2009 Authors: Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee.
Improving Routing in Sensor Networks with Heterogeneous Sensor Nodes Xiaojiang Du & Fengjing Lin Vehicular Technology Conference,2005 Spring,Volume 4.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials’ Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Author: Hangyang Dai and Hongbing Xu
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Distributed Trust Relationship & Polynomial-based Key Generation for IEEE m Networks IEEE Presentation Submission Template (Rev. 9) Document.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Key Management Techniques in Wireless Sensor Networks
Key agreement in wireless sensor network
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8, pp , Presenter: Yung-Chih Lu ( 呂勇志 ) Date: 2010/11/05 1

Outline Introduction Polynomial-based scheme Proposed Scheme Performance Evaluation Conclusion Comment 2

Introduction (1/3) Goal ◦ Key agreement ◦ Against attack  node capture attack ◦ Saving resource  storage overhead ◦ Extra service  node to node authentication 3

Introduction (2/3) Wireless Sensor Network :Base station :Low-end Sensor :High-end Sensor

Introduction (3/3) The Aspect of Key Predistribution ◦ Keys are distributed to all sensor nodes prior to deployment. ◦ Random key predistribution  Polynomial-based scheme ◦ Deterministic key predistribution  Combinatorial design 5 Key pool ={1,2,3,4} Key pool ={1,2,3,4} Sensor A Sensor B drawing Ex: {2,4} {1,4} L. Eschenauer and V. Gligor. “A Key-Management Scheme for Distributed Sensor Networks.” In Proc. 9th ACM Conference on Computerand Communication Security, pp.41-47, Nov

Theorem ◦ Setup server randomly generates a symmetric bivariate t-degree polynomial Ex: f(x,y) = 4x 2 y 2 + x 3 y 1 + x 1 y It’s a symmetric bivariate 3-degree polynomial Polynomial-based scheme (1/2) C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung. "Perfectly-secure Key Distribution for Dynamic Conferences." Lecture Notes in Computer Science,471–486, [ ] 5 0 0 0 0 0 0 1 0 0 4 0 0 1 0 0 6

Key Agreement Polynomial-based scheme (2/2) L-sensor: Low-end sensor s: Step :L v -sensor 5141 y 0 y 1 y 2 y 3 :Cluster head step1: computes 1: Cluster Head ID 2: Lv-sensor ID f(1,y) = 4y 2 + y 1 + y f(2,y) = 16y 2 + 8y 1 + 2y step2: The Setup server loads the sensor node with coefficients step3: Each sensor node broadcasts its own ID step4: Receiver use ID to compute a shared secret key K uv = f(u,v) = f(v,u) = K vu K 12 = f(1,2) = 31 = f(2,1) = K y 0 y 1 y 2 y 3 7 s3 s4

LU Decomposition K 12 =K 21 Proposed Scheme (1/5) 8 L: Lower Triangular Matrix U: Upper Triangular Matrix K: Symmetric Matrix

LU Decomposition 9 Proposed Scheme (2/5) 9 Assuming that u 11 =1, u 22 =2, u 33 =3 K: Symmetric Matrix

Proposed Scheme (3/5) Polynomial pre-distribution phase 10 Polynomial pool = {1,2,3,4, 5,6,7,8,9,10} Polynomial pool = {1,2,3,4, 5,6,7,8,9,10} drawing 1: A symmetric bivariate polynomial S: Sensor Ex: SaSa SbSb

Proposed Scheme (4/5) Shared key establishment phase s1 s /2 20 L r2 L r1 U c2 U c1 step1: Each sensor node broadcasts its L array step2: Sensors use L array to compute a shared secret Polynomial K 21 = L r2 ×U c1 = 1 = L r1 ×U c2 = K 12 1: f(x,y) = 4x 2 y 2 + x 3 y 1 + x 1 y : Shared secret polynomial S: Sensor [ ] 5 0 0 0 0 0 0 1 0 0 4 0 0 1 0 0

Proposed Scheme (5/5) Shared key establishment phase 12 SaSa SbSb LrLr K 21 = L r2 ×U c1 E K 21 [ S b_ID ] L r1 ×U c2 = K 12 D K 12 [E K 12 [ S b_ID ]] = S b_ID E K 12 [ CLR ] MAC(K 12, S b_ID || CLR) E K 21 [ S b_ID ] E K 12 [ CLR ] MAC(K 12,S B || CLR) D K 21 [E K 21 [ CLR ]] = CLR Verify MAC(K 12, S b_ID || CLR) ?= MAC(K 21, S b_ID || CLR) K: Shared secret polynomial CLR: Confirmation message S: Sensor

Performance Evaluation Network Connectivity 13 L. Eschenauer and V. Gligor. “A Key-Management Scheme for Distributed Sensor Networks.” In Proc. 9th ACM Conference on Computerand Communication Security, pp.41-47, Nov S:The key pool size S. A. Camtepe and B. Yener, “Combinatorial design of key Distribution mechanisms for wireless sensor network,” in Proc. Comput. Secur.-ESORICSpp. 293–308, 2004.

Performance Evaluation Resilience Against Node Capture 14 k: the storage per node τ:the number of polynomials in each node t': the degree of the polynomial in the Blundo scheme N: the number of nodes in the network t: the degree of a polynomial in our scheme ω :the polynomial pool size K=400

Performance Evaluation Resilience Against Node Capture 15 k: the storage per node τ:the number of polynomials in each node N: the number of nodes in the network t: the degree of a polynomial in our scheme ω :the polynomial pool size S:the key pool size q:a prime power K=400

Performance Evaluation Memory Overhead 16 N: the number of nodes in the network t: the degree of a polynomial in our scheme h: nonzero-element parts 2z: number of zeros Nt Our scheme memory (bit) Memory Saving (bit) Saving ratio × × % × × % × × % × × %

Conclusion High network connectivity Strong resilience against node capture Node to node mutual authentication Optimize the memory overhead 17

Comment LU= =LU K 12 =K 21 = [ ] Polynomial pool = {1,2,3,4, 5,6,7,8,9,10} Polynomial pool = {1,2,3,4, 5,6,7,8,9,10} drawing Polynomial pool = {1,2,3,4, 5,6,7,8,9,10} Polynomial pool = {1,2,3,4, 5,6,7,8,9,10} drawing