Download presentation
Presentation is loading. Please wait.
Published byElisabeth Gilmore Modified over 8 years ago
2
Security in Sensor Networks By: Tracy Barger, David Friedman, and Stavan Parikh
5
Swarms ?? Group Behavior Bees ! MEMS (Smart Dust) MEMS – Microelctromechanical Systems Applications –Surveillance –Smart House –Grocery Shopping –FedEx tracking on Steroids
6
Environment Constraints Power Processor: 8 bit Memory: 15K RAM: 512 bytes Devices not individually addressable
7
Trust Model Base Station –Complete Trust –Requires Authentication Motes –Trust Self Broadcast Communication: Insecure –Need Encryption
8
Key Distribution and Encryption Use symmetric cipher Keys pre-initialized in motes Use J-secure scheme (NAI Paper) n nodes, y groups All nodes in a group have same key Note: If security is a priority, keys can be refreshed using a group key distribution scheme such as key graphs K1K1 K2K2
9
Group Size Tradeoffs What’s optimal group size? s = group size Tradeoff: security v. # communications v. memory Small, one-hop -- Use s = 1 1n s
10
Hash-based Authentication Generates X n ; Calculates key Chain: H(X n ) = X n-1 … H(X 1 )= X 0 M = E(Command || X i ) Mote decrypts M, Checks H(X i ) = X i-1 Then stores X i in place of X i-1
11
Conclusion Examined current security techniques –Key Distribution –Authentication Tradeoff between modifying existing and starting from scratch May be more beneficial to create new protocols Security will be defined by application
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.