#1 The Conventional Wisdom About Sensor Network Security… David Wagner U.C. Berkeley.

Slides:



Advertisements
Similar presentations
The Future: Evolution of the Technology Ravi Sandhu Chief Scientist TriCipher, Inc. Los Gatos, California Executive Director and Chaired Professor Institute.
Advertisements

Chris Karlof and David Wagner
Communication-Avoiding Algorithms Jim Demmel EECS & Math Departments UC Berkeley.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Trust relationships in sensor networks Ruben Torres October 2004.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Jeff Bilger - CSE P 590TU - Winter 2006 The Role of Cryptography in Combating Software Piracy.
University of Rostock Applied Microelectronics and Computer Science Dept.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
TinySec: Performance Characteristics Chris K :: Naveen S :: David W January 16, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Engineering Secure Software. Recap  Symmetric key: Benefit: fastest, mathematically the strongest Drawback: distributing the keys  Public key: Benefit:
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
30/04/2004Gene Tsudik, UCLA CSD Research Review1 Some Security Issues & Challenges in MANETs and Sensor Nets Gene Tsudik SCONCE: Secure Computing and Networking.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
GROUP N Charles Barrasso Carter May Chih-Yu (Joey) Tang.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
1 Secure Ad-Hoc Network Eunjin Jung
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Distributed Computation in MANets Robot swarm developed by James Rice University.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST PI Meeting January 29, 2003.
Sensor Network Security through Identity-Based Encryption
High-integrity Sensor Networks Mani Srivastava UCLA.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
TRUSTED FLOW: Why, How and Where??? Moti Yung Columbia University.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Intrusion Tolerance for NEST
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

#1 The Conventional Wisdom About Sensor Network Security… David Wagner U.C. Berkeley

#2 The Conventional Wisdom About Sensor Network Security… David Wagner U.C. Berkeley … Is Wrong

#3 Old CW: Symmetric-key will probably need HW support Symmetric-key cryptography

#4 Old CW: Symmetric-key will probably need HW support New reality: Symmetric-key is trivial, even in software < 10% latency, bandwidth, power [TinySec] Communication costs dominate computation costs Some platforms have HW support anyway [ ] Symmetric-key cryptography

#5 Old CW: Forget public-key crypto; it is way too expensive for sensor nets. All you get is symmetric- key crypto. Public-key cryptography

#6 Old CW: Forget public-key crypto; it is way too expensive for sensor nets. All you get is symmetric- key crypto. New reality: Public-key is no big deal [Sizzle] And HW support may be coming (XScale2’s TPM) Opinion: Fancy schemes (e.g., random key predistribution) are obsolete and no longer needed Public-key cryptography [ECC-160]TimeRAMCode Atmega128 (8 MHz)0.81s0.28KB3.7KB Chipcon1010 (14 MHz)4.58s0.27KB2.2KB

#7 CW: Can’t rely on trusted infrastructure. Need truly distributed algorithms. Trust assumptions

#8 CW: Can’t rely on trusted infrastructure. Need truly distributed algorithms. My opinion: Naah. Centralized solutions are fine, for many applications. If you’re spending $10k on 100 sensor nodes, you can afford a $1k laptop-class base station with a tamper-resistant crypto module (TPM, smartcard). Exploiting hierarchy is good engineering. A trusted BS makes secure protocol design enormously easier. Designing secure distributed protocols (with no trusted infrastructure) is still intellectually challenging — but practical relevance is uncertain. Trust assumptions

#9 CW: Physical security is too hard, so if you are worried about node compromise, you’d better look for algorithms that can tolerate node compromise. Dealing with compromised nodes

#10 CW: Physical security is too hard, so if you are worried about node compromise, you’d better look for algorithms that can tolerate node compromise. New prognosis: Well, maybe. But tamper-resistance is looking cheaper and cheaper every day. Trend: Microcontrollers moving to single-chip soln. (CPU, RAM, EEPROM, radio all on one chip) ==> Harder to tamper with a sensor node Convergence of smartcards + sensor net nodes? Dealing with compromised nodes

#11 CW: Sensor net security is one giant open problem. My current thinking: There are still important and challenging research questions worth working on. But… For most applications, we have most of the tools needed to build reasonably secure solutions. The field has matured very rapidly. My vote for the most vexing open problem? Privacy. Conclusions