Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.

Slides:



Advertisements
Similar presentations
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Advertisements

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Security Issues in Wireless Sensor Networks -Ninad Naik.
Trust relationships in sensor networks Ruben Torres October 2004.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Key Infection (smart trust for smart dust) Ross Anderson (Cambridge) Haowen Chan (CMU) Adrian Perrig (CMU)
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Trusted Computing Technologies for Embedded Systems and Sensor Networks Adrian Perrig Carnegie Mellon University.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
Cryptography and Network Security
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Author: Hangyang Dai and Hongbing Xu
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Security of the Internet of Things: perspectives and challenges
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
SPINS: Security Protocols for Sensor Networks
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
SPINS: Security Protocols for Sensor Networks
Presentation transcript:

Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract

Agenda Introduction Wireless Sensor Network Definition Security Challenges Importance to Network Security Symmetric Key Cryptography Asymmetric Cryptography Pair-wise shared keys Bootstrapping

Introduction Wireless sensor networks continue to gain popularity Consist of many sensor distributed over a large area Military and civilian applications –Vehicle detection –Agricultural applications –Environmental applications –Industrial applications

Wireless Sensor Network “Spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions” Wikipedia Sensor nodes –Wireless communications device –Microcontroller –Energy source –Sizes can vary (shoebox to spec of dust)

Example Wireless Sensor Network

Security Challenges Nodes lack storage and power Older era processing power Industries want to reduce cost but maintain processing power [2]

Importance to Network Security Key security service data integrity More than just data confidentiality needed Intercepted and altered data could cause a wireless sensor network to go into unintended operation

Symmetric Key Cryptography Single network wide key prior to deployment One deployed nodes establish communication with all other nodes with the key Using a MAC they can have both data integrity and origin integrity

Symmetric Key Cryptography Advantages –Only one key needing to be stored in memory. –No additional protocol steps such as key discovery or key exchange are required. –Resistant against DoS. Attacker doesn’t know the secret key. Disadvantages –One node compromised, entire network down –Nodes have to be guaranteed to be tamper resistant –No new nodes can be added to network

Asymmetric Cryptography Based on public key cryptography Initialization –Prior to node deployment, a master public/private keypair, (K M, K M −1) generated –Then, for every node A, its public/private keypair (K A, K A −1) is generated –Node A stores (K A, K A −1), K M, and the master key’s signature on A’s public key

Asymmetric Cryptography cont Deployment –Nodes are now deployed in network Nodes then do a key exchange of public keys and master key signatures Symmetric links between the nodes are achieved

Asymmetric Cryptography cont Advantages –Resiliency against node capture. –Revoke comprised keypairs. –Scalable. Disadvantages –Asymmetric key software and or hardware needed. –Vulnerable to denial of service. –No resistance to node replication.

Pairwise-Shared Keys Every node shares a unique symmetric key with every other node For a network of n nodes, there are n/2 unique keys Every node stores n-1 keys, one of each of the other nodes in the network [3] Nodes perform key discovery after deployment

Pairwise-Shared Keys cont Advantages –Resiliency against node capture. –Revoke comprised keypairs. –Symmetric cryptography. Disadvantages –Poor scalability

Bootstrapping Security off Base Station Use secure base station link provide link keys to sensor nodes. [3] Similar to Kerberos. Prior to deployment unique symmetric key generated for all nodes. Nodes communicate with each other through trusted third party “base station”

Bootstrapping Security off Base Station Advantages –Small memory requirement –Resiliency against node capture. –Revocation of nodes simple –Node replication is controllable Disadvantages –Base station a target for compromise –Not scalable

References [1] Fei Hu, Jim Ziobro, Jason Tillett, and Neeraj K. Sharma. Secure Wireless Sensor Networks: Problems and Solutions Journal of Systemics, Cybernetics and Informatics, Volume 1 - Number 4 [2] John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary. Wireless Sensor Network Security: A Survey Department of Computer Science Wayne State University, Security in Distributed, Grid, and Pervasive Computing, Chapter 17 [3] Haowen Chan, Adrian Perrig, Dawn Song. Random Key Predistribution Schemes for Sensor Networks, Carnegie Mellon University, In 2003 IEEE Symposium on Research in Security and Privacy. pp