Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.

Slides:



Advertisements
Similar presentations
Giuseppe Bianchi Lecture 6.1: Extras: Merkle Trees.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Security Issues In Sensor Networks By Priya Palanivelu.
Cryptography Basic (cont)
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 Sensor Networks Security and Privacy in Sensor Networks Haowen Chan and Adrian Perrig SPINS Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Security Introduction Class February Overview  Security Properties  Security Primitives  Sample Protocols.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
SPINS: Security Protocols in Sensor Networks
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Security in Wireless Sensor Networks by Toni Farley.
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
By Prateek Arora Security for Sensor Networks By: Prateek Arora.
Security for Broadcast Network
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Security and Performance Trade-off in wireless sensor network
Message Authentication Code
Basics of Cryptography
Packet Leashes: Defense Against Wormhole Attacks
SPINS: Security Protocols for Sensor Networks
Chapter 8 Network Security.
Basic Network Encryption
Cryptography.
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
SPINS: Security Protocols for Sensor Networks
Security through Encryption
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Security in Network Communications
Introduction to Symmetric-key and Public-key Cryptography
BROADCAST AUTHENTICATION
Anonymity - Background
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Security Of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Security of Wireless Sensor Networks
Security Outline Encryption Algorithms Authentication Protocols
Chapter 29 Cryptography and Network Security
SPINS: Security Protocols for Sensor Networks
Basic Network Encryption
Basic of Modern Cryptography
Message Authentication
Presentation transcript:

Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor networks and security are important Sensors are deployed in hostile territory. The communications are sparse because of energy constraints, the computational resources are sparse. However, attackers need not be energy constrained, they can replay packets, inject spurious packets etc. and affect the system How do we make security (heavy weight) fit into sensor scenarios (low resources) Slides courtesy Adrian Perrig

Security in sensor networks Emergency response: responders need security Medical monitoring: automated drug delivery - need security to ensure safety Logistics and inventory management: Battlefield management Security: Authentication Ensures data integrity & origin Prevents injecting bogus messages Confidentiality Ensures secrecy of data Prevents eavesdropping

Challenges Integrity of sensor: hard to manage without expensive crypto processors or ensuring physical security Key distribution is a challenge Don’t want to store private keys in sensors Key strength weakens with time Freshness important Prevent replay attack Define notions of strong freshness (delay estimation, total ordering) and weak freshness (partial ordering) Keys are too long to store, much less process Authenticated broadcast challenging

Challenge: Resource Constraints Limited energy Limited computation (4 MHz 8-bit) Limited memory (512 bytes) Limited code size (8 Kbytes) ~3.5 K base code (“TinyOS” + radio encoder) Only 4.5 K for application & security Limited communication (30 byte packets) Energy-consuming communication 1 byte transmission = 11000 instructions

SPINS: Our Solution TESLA SNEP Sensor-Network Encryption Protocol Secures point-to-point communication TESLA Micro Timed Efficient Stream Loss-tolerant Authentication Provides broadcast authentication

System Assumptions Communication patterns Base station Node Frequent node-base station exchanges Frequent network flooding from base Node-node interactions infrequent Base station Sufficient memory, power Shares secret key with each node Node Limited resources, limited trust

SNEP Security Goals Secure point-to-point communication Confidentiality, secrecy Authenticity and integrity Message freshness to prevent replay Why not use existing protocols? E.g. SSL/TLS, IPSEC

Encryption methods (background) Symmetric cryptography Sender and receiver know the secret key (apriori ) Fast encryption, but key exchange should happen outside the system Asymmetric cryptography Each person maintains two keys, public and private M  PrivateKey(PublicKey(M)) M  PublicKey (PrivateKey(M)) Public part is available to anyone, private part is only known to the sender E.g. Pretty Good Privacy (PGP), RSA

Asymmetric Cryptography is Unsuitable Overhead of digital signatures High generation cost O(minutes) High verification cost O(seconds) High memory requirement High communication cost ~128 bytes SNEP only uses symmetric crypto

Basic Crypto Primitives Code size constraints  code reuse Only use block cipher encrypt function Counter mode encryption Cipher-block-chaining message authentication code (MAC) Pseudo-Random Generator

SNEP Protocol Details A and B share Encryption keys: KAB KBA MAC keys: K'AB K'BA Counters: CA CB To send data D, A sends to B: A  B: {D}<KAB, CA> MAC( K'AB , [CA || {D}<KAB, CA>] )

SNEP Properties Secrecy & confidentiality Authentication Semantic security against chosen ciphertext attack (strongest security notion for encryption) Authentication Replay protection Code size: 1.5 Kbytes Strong freshness protocol in paper

Broadcast Authentication Broadcast is basic communication mechanism Sender broadcasts data Each receiver verifies data origin Alice M Sender M Dave M M Bob Carol

Simple MAC Insecure for Broadcast Sender Alice K M, MAC(K,M) Bob K M, MAC(K,M) M', MAC(K,M')

TESLA: Authenticated Broadcast Uses purely symmetric primitives Asymmetry from delayed key disclosure Self-authenticating keys Requires loose time synchronization Use SNEP with strong freshness

TESLA Quick Overview I Keys disclosed 2 time intervals after use Receiver knows authentic K3 Authentication of P1: MAC(K5, P1 ) F Authenticate K5 F K5 F K6 K3 K4 K5 K6 K7 t Time 4 Time 5 Time 6 Time 7 P1 P2 K5 Verify MAC K3

TESLA Quick Overview II Perfect robustness to packet loss F Authenticate K5 K3 K4 K5 K6 K7 t Time 4 Time 5 Time 6 Time 7 P1 K2 P2 K2 P3 K3 P4 K4 P5 K5 Verify MACs

TESLA Properties Low overhead (1 MAC) Communication (same as SNEP) Computation (~ 2 MAC computations) Perfect robustness to packet loss Independent of number of receivers

Energy Cost for Sending a Message Typical packet size: 28 bytes Security Computation 2% MAC transmission 21% Data transmission 77%

Conclusion Strong security protocols affordable Low security overhead First broadcast authentication Low security overhead Computation, memory, communication Apply to future sensor networks Energy limitations persist Tendency to use minimal hardware Base protocol for more sophisticated security services