A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
The Sybil Attack in Sensor Networks: Analysis & Defenses J. Newsome, E. Shi, D. Song and A. Perrig IPSN’04.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
1 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis Ekta Jain and Qilian Liang, Department of Electrical Engineering,
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Aggregation in Sensor Networks
Key Management in Mobile and Sensor Networks Class 17.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Author: Hangyang Dai and Hongbing Xu
Coverage and Energy Tradeoff in Density Control on Sensor Networks Yi Shang and Hongchi Shi University of Missouri-Columbia ICPADS’05.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Centralized Transmission Power Scheduling in Wireless Sensor Networks Qin Wang Computer Depart., U. of Science & Technology Beijing Edward Y. Hua Wireless.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Strong Barrier Coverage of Wireless Sensor Networks Benyuan Liu, Olivier Dousse, Jie Wang and Anwar Saipulla University of Massachusetts Lowell and Deutsche.
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Presentation transcript:

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.

Outline Introduction Modeling deployment knowledge Key pre-distribution using deployment knowledge Performance evaluation Conclusion

Introduction Problem –Key pre-distribution in sensor network Previous work –Random key pre-distribution scheme –Improvement to random scheme q-composite scheme Polynomial-based scheme Common assumption –No deployment knowledge is available

New assumption In many practical scenarios –Certain deployment knowledge may be available What is deployment knowledge –How are sensors deployed? –Are they uniformly randomly distributed? Deployment method –Uniformly randomly distributed No deployment knowledge –Non-uniform distribution Deployed by groups Possible to know where a node is more likely to reside Useful –Most communications are between neighbors –Deployment knowledge helps us to know which nodes are more likely to be neighbors for each node

Modeling deployment knowledge Probability density function (pdf) General Deployment Model –Deployment area 2-dimensional rectangular area X x Y –pdf for the location of node i, i = 1,…,N f i (x,y), Existing key pre-distribution schemes assume –f i (x,y) = 1/XY –All sensor nodes are uniformly distributed over the deployment region

Modeling deployment knowledge (Cont’d) Group-based Deployment Model –N sensor nodes are divided into t x n groups Probability node is in a certain group is (1 / tn) –Group G i,j is deployed from the point (x i,y j ) –The resident point of node k in group G i,j follow the pdf Example of pdf f(x,y): 2-dimensional Guassian distribution Deployment Points

Modeling deployment knowledge (Cont’d) Deployment distribution used in paper –2-dimensional Gaussian distribution for each group –Overall distribution over the entire deployment region

Modeling deployment knowledge (Cont’d) Why use group-based model –Easy to determine which nodes are more likely to be close to each other Distance between two deployment points increases  Probability for two nodes from these two groups become neighbors decreases –Different groups can use different key pools Key pool size is smaller  better connectivity Two groups are far away  overlap between their key pools becomes smaller Notations –S i,j : key pool used by group G i,j, –|S c |: size of S i,j,

Key Pre-distribution Scheme Step 1: Key pre-distribution –Divide the key pool S into t x n key pools S i,j S i,j corresponding to deployment group G i,j | S i,j | = | S c |, for any i, j Nearby key pools share more key Far away key pools share less or no key –Two horizontally or vertically neighboring key pools share exactly a|Sc| key spaces, 0 <= a <= 0.25 –Two diagonally neighboring key pools share exactly b|Sc| key spaces, 0 <= b <= 0.25 –Two non-neighboring key pools share no key spaces

Key Pre-distribution Scheme Key sharing among key pools Horizontal VerticalDiagonal a ab b bb b A C F HI D G a aa a B

Key Pre-distribution Scheme Determining |S c | –Given key pool |S|, overlapping factor a, b –S i,j –Determine

Key Pre-distribution Scheme Select keys for each key pool S i,j –Global key pool S –Overlapping factor a and b Global Key Pool S 11-a 1-(a+b)1-2(a+b) 1-(2a+b) 1-(a+b)1-2(a+b) 1-(2a+b) 1-(a+b)1-2(a+b) 1-(2a+b) |S c | keys a|S c | keys 1-a|S c | keys a|S c | keys b|S c | keys 1-(a+b)|S c | keys t = 4, n = 4

Key Pre-distribution Scheme Effects of the Overlapping Factors –Best overlapping factors Combination of a and b that maximizes the local connectivity

Key Pre-distribution Scheme Step 2: Shared-key discovery –After deployment, every node will find out whether it shares keys with its neighbors Step 3: Path-key establishment –Two neighboring nodes cannot find any common key –Use secure channels that have already been established

Performance Evaluation Performance metrics: –Local connectivity p local The prob. of any two neighboring nodes sharing at least one key –Resilience against node capture The fraction of additional communications (communications among uncaptured nodes) that an adversary can compromise based on the information retrieve from x captured nodes –Communication overhead When two neighboring nodes cannot find a common key ph(l): prob. That the smallest number of hops needed to connect two neighboring nodes is l

Performance Evaluation Local connectivity

Performance Evaluation Resilience against node capture

Performance Evaluation Communication overhead

Conclusion Use pdf to model deployment knowledge Propose a key pre-distribution scheme using deployment knowledge –Sensors carry less key –Achieves same level of connectivity –Improves network’s resilience against node capture