1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Chris Karlof and David Wagner
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Security in Wireless Sensor Networks: Key Management Approaches
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Intrusion Detection in Wireless Sensor Networks Group Meeting Spring 2005 Presented by Edith Ngai.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Authors: H. Chan, A. Perrig, and D. Song Carnegie Mellon University Presented by: Yuliya Olmo April 13,
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Key management in wireless sensor networks Kevin Wang.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Key Management in Mobile and Sensor Networks Class 17.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Author: Hangyang Dai and Hongbing Xu
Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148.
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Wireless sensor networks: a survey
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Connected Sensor Cover Problem
Presentation transcript:

1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai

2 Outline Wireless Sensor Networks (WSN) Security in WSN Key Management Approaches  Straight Forward Approach  Basic Probabilistic Approach  Deployment-based Approach Conclusion References

3 Wireless Sensor Networks A sensor network is composed of a large number of sensor nodes Sensor nodes are small, low- cost, low-power devices that have following functionality:  communicate on short distances  sense environmental data  perform limited data processing The network usually also contains “sink” node which connects it to the outside world Berkeley Motes

4 Applications WSN can be used to monitor the conditions of various objects / processes  Military: battlefield surveillance, biological attack detection, targeting  Ecological: fire detection, flood detection, agricultural uses  Health related: human physiological data monitoring  Miscellaneous: car theft detection, inventory control, home applications Sensors are densely deployed either inside or very close to the monitored object / process

5 Security in WSN Main security threats in WSN are:  Radio links are insecure – eavesdropping / injecting faulty information is possible  Sensor nodes are not temper resistant – if it is compromised the attacker obtains all security information Protecting confidentiality, integrity, and availability of the communications and computations

6 Why Security is Different? Sensor Node Constraints –Battery –CPU power –Memory Networking Constraints and Features –Wireless –Ad hoc –Unattended

7 Key Management: Goals The protocol must establish a key between all sensor nodes that must exchange data securely Node addition / deletion should be supported It should work in undefined deployment environment Unauthorized nodes should not be allowed to establish communication with network nodes

8 Key Management Problem Secure Channels Deploy Sensors

9 Approaches Trusted-server schemes  Finding trusted servers is difficult Public-key schemes  Expensive and infeasible for sensors Key pre-distribution schemes

10 Loading Keys into sensor nodes prior to deployment Two nodes find a common key between them after deployment Challenges Memory/Energy efficiency Security: nodes can be compromised Scalability: new nodes might be added later Key Pre-distribution

11 Straight Forward Approach Single mission key is obviously unacceptable Pairwise private key sharing between every two nodes is impractical because of the following reasons:  it requires pre-distribution and storage of n-1 keys in each node which is n(n-1)/2 per WSN  most of the keys would be unusable since direct communication is possible only in the nodes neighborhood  addition / deletion of the node and re-keying are complex

12 Basic Probabilistic Approach Proposed by Eschenauer and Gligor Relies on probabilistic key sharing among nodes of WSN Uses simple shared-key discovery protocol for key distribution, revocation and node re-keying Three phases are involved: key pre-distribution, shared-key discovery, path-key establishment

13 Eschenauer-Gligor Scheme Each node randomly selects m keys A BE Key Pool S DC When |S| = 10,000, m=75 Pr (two nodes have a common key) = 0.50

14 Establishing Secure Channels A C B

15 Observations and Objectives A B F Problem: How to pick a large key pool while maintaining high connectivity? (i.e. maintain resilience while ensuring connectivity)

16 Deployment-based Scheme Proposed by Du, et. al (IEEE Infocom 2004) Improves Random Key Predistribution (Eschenauer and Gligor) by exploiting Location Information Studies a Gaussian distribution for deployment of Sensor nodes to improve security and memory usage

17 Deployment-based Scheme Groups select from key group S (i,j) Probability node is in a certain group is (1 / tn).

18 Step 1 : Key Pre-distribution - Key Sharing Among Key Pools -   A BC F HI D G        Horizontal VerticalDiagonal

19 Step 1 : Key Pre-distribution - Key Sharing Among Key Pools - Determining |Sc|  When |S| = 100,000, t = n = 10, a = 0.167, b = |Sc| = 1770

20 Step 2: Shared-key Discovery Takes place during initialization phase after WSN deployment. Each node discovers its neighbor in communication range with which it shares at least one key Nodes can exchange IDs of keys that they poses and in this way discover a common key A more secure approach would involve broadcasting a challenge for each key in the key ring such that each challenge is encrypted with some particular key. The decryption of a challenge is possible only if a shared key exists

21 Step 3: Path-key Establishment During the path-key establishment phase path-keys are assigned to selected pairs of sensor nodes that are within communication range of each other, but do not share a key Find secure path by using flooding method  Limit the lifetime of the flooding message to three hops to reduce flooding overhead Share random key K by using secure path

22 Local Connectivity With 100 keys, location management improves local connectivity from to 0.687

23 Network Resilience What is the damage when x nodes are compromised?  These x nodes contain keys that are used by the good nodes  What percentage of communications can be affected?

24 Conclusion Robust security mechanisms are vital to the wide acceptance and use of senor networks for many applications Security in WSN is quite different from traditional (wired) network security Various peculiarities of WSN make the development of good key scheme a challenging task We have discussed several approaches to key management in WSN

25 References I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cyirci. Wireless Sensor Networks: A Survey. Computer Networks, 38(4): , L. Eschenauer and V. Gligor. A Key-Management Scheme for Distributed Sensor Networks. In Proc. of ACM CCS’02, November H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks. In 2003 IEEE Symposium on Research in Security and Privacy. W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE Infocom 2004.