Download presentation
Presentation is loading. Please wait.
1
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley
2
Applications need Security Earthquake & fire sensors Pollution monitoring Energy management Military applications Absence of security enables attacks such as spoofing & replay attacks, resulting in DoS or system compromise
3
Main Security Requirements Authentication Receiver verifies sender (prevents spoofing) Also provides integrity Confidentiality Data remains secret Freshness Receiver knows message is recent (prevents replay) Digital signatures (non-repudiation) Receiver can prove sender to third party Usually not necessary
4
System Constraints Sensors not tamper-proof Limited energy Limited computation (4 MHz 8-bit) Limited memory (512 bytes) Limited code size (8 Kbytes) ~3.5 K base code (“TinyOS” + radio encoder) Only 4.5 K for application & security Limited communication (30 byte packets) Energy-consuming communication 1 byte transmission = 11000 instructions
5
Scenario 1: Static Nodes Nodes don’t move Drop sensor nodes from airplanes Build sensor nodes into bricks, steel beams Topology change only for node addition and removal Goal: Set up shared keys among neighbor nodes
6
Traditional Approaches Pre-load global key before deployment Vulnerable to node compromise Pre-load all pair-wise keys Need O(n 2 ) keys Vulnerable to node compromise Hard to add new nodes Diffie-Hellman key agreement Computationally expensive Might work if only needed initially Prone to denial-of-service attacks
7
More Approaches SPINS [with Culler, Szewczyk, Tygar, Wen] Base station shares key with each node New keys setup through base station Expensive to set up all keys among neighbors through base station Can we do better? Let’s try a crazy idea …
8
Key Infection Collaboration with Ross Anderson Goal: Nodes set up keys with neighbors Assumptions: Attacker nodes have same capability as good nodes Attacker nodes less dense than good nodes Attacker compromises small fraction of good nodes Basic key agreement protocol A * : A, K A B A : { A, B, K B } K A K AB = H( A | B | K A | K B )
9
Key Infection AB M4 M2 M3 M1 Broadcast keys with maximum signal strength
10
Key Whispering Extension AB M4 M2 M3 M1 Broadcast keys with minimum signal strength to reach neighbor
11
Secrecy Amplification A B C D E A & B share K AB, A & C share K AC,, etc. Strengthen secrecy of K’ AB A C : { B, A, N A } K AC C B : { B, A, N A } K CB B D : { A, B, N B } K BD D E : { A, B, N B } K DE E A : { A, B, N B } K AE K’ AB = H( K AB | N A | N B )
12
Key Infection Summary Highly efficient Detailed analysis in progress Preliminary simulation results: Nodes uniformly distributed over a plane D (density): average # of nodes within radio range # of attacker nodes = 1% of good nodes Table shows fraction of compromised links DBasicWhisperSASA-W 21.1%0.4%1.0%0.3% 31.8%0.6%1.4%0.5% 52.9%1.0%2.4%0.8%
13
Scenario 2: Dynamic Nodes Assume nodes roam around Any pair of nodes communicates Per-message authentication & freshness
14
Traditional Approaches Pre-load global key before deployment Vulnerable to node compromise Pre-load all pair-wise keys Need O(n 2 ) keys Vulnerable to node compromise Hard to add new nodes Digital signatures Too expensive on a per-message basis Prone to denial-of-service attacks
15
TESLA for Authentication With Canetti, Song, Tygar Designed for broadcast authentication Use for point-to-point authentication Only need to set up n public keys Uses efficient symmetric crypto Requires loose time synchronization
16
Basic Authentication Mechanism t F(K) Authentic Commitment P MAC(K,P) K disclosed 1: Verify K 2: Verify MAC 3: P Authentic! F: one-way function
17
Security Condition Security condition (for packet P): on arrival of P, receiver is certain that sender did not yet disclose K If security condition not satisfied, drop packet Attacker can at most do denial-of-service attack Speeding up / delaying packets does not help
18
TESLA Keys disclosed 2 time intervals after use Receiver knows authentic K3 K4K5K6K7 t Time 4Time 5Time 6Time 7 K3 P2 K5 P1 K3 Authentication of P1: MAC(K5, P1 ) FF Authenticate K5 Verify MAC F K6 F K5
19
TESLA: Robust to Packet Loss K4K5K6K7 t Time 4Time 5Time 6Time 7 K3 P5 K5 P3 K3 P2 K2 P1 K2 Verify MACs P4 K4 FF Authenticate K5
20
Summary Low overhead Communication (~ 20 bytes) Computation (~ 1 MAC computation per packet) Perfect robustness to packet loss Delayed authentication Also provides freshness Drawback: not secure with time travel
21
TIK: TESLA with Instant Key Disclosure With Hu, Johnson Assume accurate time synchronization Trimble Thunderbolt GPS clock: ±180 ns Can disclose key in same packet! Receiver instantly authenticates packet
22
Sending a TIK Frame MACDataKey MACDataKey time
23
TIK Summary Example: 11 Mbps network, 300m range With 1 s time synchronization error (e.g. GPS clock synchronization), works for packet size > 20 bytes Provides strong freshness guarantee Works for more powerful sensor nodes, PDAs, cell phones, etc.
24
Conclusion & Open Problems Efficient key establishment is challenging Large static sensor networks Use key infection for local key establishment? Dynamic sensor networks TESLA for point-to-point authentication Also provides freshness Accurate time sync: TIK
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.