Download presentation
Presentation is loading. Please wait.
Published byJuliana Woods Modified over 9 years ago
1
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar
2
Lecture Plan 1. Introduction to Wireless sensor networks WSNs 2. Security requirements in wireless sensor nodes 3. Obstacles of Sensor security 4. Introduction to cryptography – Symmetric and Asymmetric methods 5. Comparison of symmetric and assymetric methods on WSNs. 6. Asymmetric cryptography techniques (RSA and ECC) 7. Tools/Software platforms 8. Conclusion 9. Reference 223rd August 2014Department seminar
3
1. WIRELESS SENSOR NETWORKS (WSNs) Sensor networks – heterogeneous system combining tiny sensors and actuators with general purpose computing elements. Self organizing, low power, low cost wireless sensor nodes deployed to monitor the environment. Issues – limited power supplies, low band width, small memory sizes and limited energy. 323rd August 2014Department seminar
4
Figure 1:Wireless Sensor Network 423rd August 2014Department seminar
5
2. Security requirements in wireless sensor nodes Confidentiality Authentication Integrity Availability 523rd August 2014Department seminar
6
3. Obstacles of Sensor Security 1. Very Limited Resources a) Limited Memory and Storage Space. b) Power limitation c)Transmission range 2. Unreliable Communication a) Unreliable transfer b) Conflicts c) Latency 623rd August 2014Department seminar
7
3. Unattended operation a) Exposure to physical attacks b) Managed remotely c) Lack of central management point 723rd August 2014Department seminar
8
4. Cryptography – Symmetric and Asymmetric methods 823rd August 2014Department seminar
9
923rd August 2014Department seminar
10
5. Comparison of Symmetric and Asymmetric on WSNs Symmetric Cryptography Adv - Faster in computation – eg AES, 3DES - Less processing - Less energy & bandwidth consumption - More expensive Disadv - Using symmetric keys between two nodes is fine. But as the network grows, this method cant fit into it (key distribution issue). 1023rd August 2014Department seminar
11
Asymmetric/Public key cryptography Adv - Higher degree of security as it uses standard security protocols such as IPSec. - When sensor network grows, this method is ideal and fit into the scale - Mathematical structure in the algorithm Disadv - Uses more energy and bandwidth -Long processing time and computationally complex -WSN should have higher capacity (CPU and memory power) – therefore, expensive. 1123rd August 2014Department seminar
12
6. Asymmetric Cryptography techniques (RSA & ECC) RSA Algorithm (security is based on the difficulty of factoring large prime numbers) ECC Algorithm (depend on the algebraic structure of elliptic curve. ECC – Size of elliptic curve (issue). ECC – Smaller key size, reduced storage/transmission but RSA – req large modulus, large key size (eg 256 bit ECC public key provide comparable security with 3072 bit RSA public key. 1223rd August 2014Department seminar
13
7. Tools/Software platforms TinyOS Contiki simulation Network Simulator for node creations OMNET++ 1323rd August 2014Department seminar
14
8. Conclusion WSNs security issues a big constraint as the nodes deposited at remote places Security algorithms selection taking care of all constraints – energy, bandwidth, resources, computaion, processing, connectivity, node failure…. 1423rd August 2014Department seminar
15
9. Reference Madhumita Panda, ‘Security in Wireless Sensor Networks using Cryptography Techniques’, American Journal of Engineering Research, e-ISSN:2320 – 0847 p-ISSN:2320 – 0936, Vol. 3, Issue- 01, pp-50-56 1523rd August 2014Department seminar
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.