Presentation is loading. Please wait.

Presentation is loading. Please wait.

SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.

Similar presentations


Presentation on theme: "SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1."— Presentation transcript:

1 SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1

2 Link layer Security architecture for WSN TinyPK – Public key cryptography based security primitive TinyECC - Public key cryptography based security primitive SPINS – Symmetric key (Block Cipher) based security primitive TinySec - Symmetric key (Block Cipher) based security primitive Dragon MAC – Stream Cipher based security primitive Rabbit MAC – Stream Cipher based security primitive 2

3 SPINS: Security Protocol for Sensor Network [1] Two secure building blocks SENP +  TESLA Sensor-Network Encryption Protocol RC-5 block cipher were used. Provide data confidentiality, two party data authentication and data freshness Micro Timed Efficient Stream Loss-tolerant Authentication Provide authenticated broadcast Secures point-to-point communication 3

4 SPINS: Security Protocol for Sensor Network … However, as pointed out by Menezes et. al. in [2], this is not a very good implementation; the randomness of the random number generator that is based on a block cipher may lead to unexpected security problem Also available memory is one major problem. SPINS EncryptionYes – CTR mode Block CipherRC5 FreshnessYes Code requirement2674 Bytes maximum AuthenticationYes – CBC MAC Time7.2ms 4

5 TinySec [3] Two Security Options Authentication Encryption (TinySec-AE) Authentication only (TinySec-Au) – default mode Encryption : Block cipher used Skipjack Achieves low energy consumption and memory usage However, it can not provide protection against replay attacks TinySec EncryptionOptional – CBC mode Block CipherSkipjack FreshnessNo Code Requirement7146 Bytes maximum AuthenticationYes – CBC MAC Key AgreementAny 5

6 TinyPK [4] Software based implementation of public key cryptography protocol TinyPK is based on RSA cryptosystem. TinyPK requires a Certificate Authority. Any external party that wishes to interact with the node also requires its own Public/private key Based on the Diffie-Hellman key agreement protocol the authentication is done. 6

7 TinyPK … it requires relatively higher processing time for a single message it consumes lot of energy and bandwidth for the setup of session key Memory SizeExecution Time 7

8 TinyECC [5] Elliptic curve cryptography(ECC) Based on the elliptic curve discrete logarithm problem No sub exponential algorithm to solve it are known Provide a digital signature scheme, a key agreement protocol and a public key encryption scheme. Configurability is one unique feature of this TinyECC. However, TinyECC needs to store a public key of 40 bytes for every sender, every receiver. It suffers from scalable problem [6]. 8

9 Dragon cipher Lim et. al [7], proposed a Dragon-MAC secure data scheme, which is based on Dragon Stream Cipher. Dragon-MAC: provide authenticated encryption, based on Dragon Stream cipher. Dragon is Word based Algorithm. Two variants Dragon-128 Dragon-256 Dragon fast in software implementation. Selected for European estream’s project. 9

10 Rabbit cipher Tahir et. al. proposed a lightweight authenticated encryption mechanism based on Rabbit stream cipher for wireless sensor network. Generates a rabbit based MAC function to ensure data authentication and integrity 10

11 Research Objectives To implement the PingPong-128 at the link layer to ensure the security of wireless sensor network PingPong-128 is a key generator which is based on the summation generator with a mutual clock control structure 11

12 Reference 12 1. Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J.D. (2002) SPINS: security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002. 2. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, 5 th ed., CRC Press, 1996. 3. Karlof, C., Shastry, N. and Wagner, D. (2004) Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA. 4. R. Watro, D Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology”, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004. 5. A Liu, P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks”, 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), April 2008, pp. 245-256.

13 Reference 13 6. Z. Xin, W. Xiao-dong, “Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks”, International Journal of Advanced Science and Technology, vol. 2, January, 2009. 7. S. Y. Lim, C. C. Pu, H. T. Lim, H. J. Lee, “Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption”. 8. R. Tahir, M. Y. Javed, A. R. Cheema, “Rabbit-MAC: lightweight Authenticated Encryption in WSN”, international Conference on Information and Automation june 20-23, Zhangjiajia, China. IEEE2008. 9. H. J. Lee, K. Chen, “PingPong-128, A New Stream Cipher for Ubiquitous Application”, 2007 ICCIT, IEEE computer Society.


Download ppt "SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1."

Similar presentations


Ads by Google