Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations.

Slides:



Advertisements
Similar presentations
The Average Case Complexity of Counting Distinct Elements David Woodruff IBM Almaden.
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Trust relationships in sensor networks Ruben Torres October 2004.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Prepared by Ilya Kolchinsky.  n generals, communicating through messengers  some of the generals (up to m) might be traitors  all loyal generals should.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Parallel Scheduling of Complex DAGs under Uncertainty Grzegorz Malewicz.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Contents Balanced Incomplete Block Design (BIBD) & Projective Plane Generalized Quadrangle (GQ) Mapping and Construction Analysis.
Session 4 Asymmetric ciphers.
1 Complexity of Network Synchronization Raeda Naamnieh.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Random Key Predistribution Schemes For Sensor Networks Haowan Chen, Adrian Perigg, Dawn Song.
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
Distributed Combinatorial Optimization
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Aggregation in Sensor Networks
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Efficient Key Predistribution for Grid – Based Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Author: Hangyang Dai and Hongbing Xu
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Securing Wireless Sensor Networks
RS – Reed Solomon List Decoding.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Locality In Distributed Graph Algorithms
Presentation transcript:

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Introduction Distributed sensor networks (DSNs) –What are they?

Introduction Distributed sensor networks (DSNs) –What are they? –What for? Civilian areas –Forest fire sensors –Sensors of vibrations to predict earthquakes –Sensors of chemical substances to discover pollution

Introduction Distributed sensor networks (DSNs) –What are they? –What for? Civilian areas –Forest fire sensors –Sensors of vibrations to predict earthquakes –Sensors of chemical substances to discover pollution Military applications –Collecting images –Collecting sounds

Requirements Accumulate secret information (and relay it to a base station) Communicate with each other As small as possible Consume little power Encryption

Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

Two trivial examples Every node is given the same secret “master key” Low Memory costs Compromise of a single node would render the network completely insecure and unreliable For every pair of nodes and there is a secret key given only to these 2 nodes Expensive memory costs Excellent resiliency (security)

Ways to establish pairwise secret keys Using public key protocols Expensive computational costs Increased storage requirements Establishing a trusted server that can communicate with all the nodes in the network (like Kerberos) Expensive costs for message relay Employing key predistribution schemes (also called KPSs)

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Related Prior Work Several schemes were proposed for KPS The schemes we will be discussing closely rely on previous work We will mention 7 other schemes

The Basic Scheme Developed by Eschenauer and Gligor 3 Parameters: –n number of nodes –k size of key ring –v size of key space Nodes communicate if they have a shared key –Encryption is done using the shared key

The Basic Scheme n can grow greatly even for medium values of v and k

Basic scheme: Deterministic vs Randomized Key Rings Randomized Keys are chosen by random Key ring assignment is done by random Deterministic Keys are still chosen by random! Key ring assignment is deterministic

Basic scheme: Deterministic vs Randomized Key Rings Deterministic No overhead Combinatorial properties are guaranteed. Shared-key discovery and path key establishments can be done in O(1). Randomized Significant overhead in generating good pasudo- random numbers Combinatorial properties are not guaranteed (such as connectivity) Shared-key discovery and path key establishments – O(???)

q Composite Scheme Generalization of the Basic Scheme Two nodes communicate directly if they have at least q common keys –Encryption key is created using all common keys If q=1 then similar to Basic Scheme, yet different

Camtepe and Yener’s Scheme First scheme to use combinatorial designs called Set Systems Blocks and points

2005 Lee and Stinson’s Scheme Authors of the article Set Systems Linear polynomials over a finite field

Chakrabarti, Maitra, and Roy’s Scheme Start with a certain Set System Form key rings by merging blocks Larger key rings Some performance metrics are improved

Multiple Space Schemes Combine basic KPS (set systems) with older KPS such as Blom[1985] Inner and outer schemes

Multiple Space Schemes Blom [1985]

Hash Chain Schemes Another avenue of research using KPS Good resilience Bad complexity

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

A Set System A set system is a pair (X,A) A is a finite set of subsets of X called blocks The degree of a point is the number of blocks containing x )X,A) is regular if (of degree r) if all points have the same degree r The rank of (X,A) is the size of the largest block. If all blocks have the same size, say k, then (X,A) is said to be uniform (of rank k)

Example X={1,2,3,4,5,6,7,8,9} A={123,456,789,147,258, ,267,348,168,249,357}

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

The 3 phases –There are 3 basic operation that should be implemented: Key predistribution Shared-key discovery Path-key establishment

Key Predistribution Phase Choose n and k input parameters Center creates a uniform and regular set system with rank k and n blocks Center determines q Assignment algorithm What happens if A is just a set of n random k sized blocks?

Shared-Key Discovery phase The phase in which 2 nodes determine the common points in the 2 blocks assigned to them –Suggestion: node i would broadcast the k points in to each of its neighbors Suppose that 2 nodes discover that and have exactly t common points : if t>=q then they can establish a secret key

The secret key h is a public key derivation function (such as SHA-1) We are using all the common keys to derive the pairwise key in order to achieve maximum resiliency!

Path-Key Establishment phase What happens if 2 nodes in wireless communication rage fail to find sufficient number of common keys in the shared-key discovery phase? –They look for multiple secure links (or hops) to reach each other

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Metrics for the Evaluation of KPSs Network Size (denoted by n) Key Storage (denoted by k) Global connectivity Local connectivity Resiliency Complexity of Shared-Key Discovery and Path-Key Establishment

Network Size The number of nodes in a DSN, which we denote by the parameter n. –The number of nodes is usually between 1,000 and 10,000 nodes (or even higher) –Notice that in some schemes cannot be chosen independently!

Key Storage The number of keys per node, which we denote by the parameter k –When we use a combinatorial set system as a key ring space, the number of keys per node is equal to the rank of the set system, which is denoted by k

Global Connectivity The communication capabilities of the network –It is depended on the physical level and the network level The Physical Level is represented by the physical graph The Network Level is represented by the block graph –Determined by the structure of the key ring space

They Key-Sharing Graph It is the intersection between the physical graph and the block graph We hope that the key sharing graph is connected We say that the DSN is globally connected if the key sharing graph is a connected graph

Local Connectivity Refers to the situation where nodes that are physically close to each other can establish a short secure communication path between them Pr1 – The probability that 2 random nodes share at least q common keys Pr2 – The probability that 2 nodes in wireless communication range do not share q common keys but there exist a third node that shares q common keys with each of the first 2 nodes

Resiliency When an adversary captures a number of sensor nodes at random we assume that all the keys of information stored in the nodes are revealed to the adversary. We want node captures to affect as small a part of the entire network as possible The resiliency of the network is estimated by fail(s), which is the probability that a link between 2 fixed noncompromised nodes is affected after s other nodes are compromised

Complexity of Shared-Key Discovery and Path-Key Establishment Shared-Key discovery is often done by having the 2 nodes exchange the list of identifiers of the keys they hold If the 2 lists are presorted in increasing order of key identifiers then this can be done in time O(k) By choosing carefully structured key ring space we can obtain an algebraic description of the key rings In that case we can reduce the computational complexity of shared-key discovery to O(1)!!!

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Configurations We’ll have q=1 for the rest of the discussion (v,n,r,k)-designs Necessary condition for existing configuration nk = vr

LEMMA 1 Any vertex (i.e., block) A j in the block graph GA of a (v, n, r, k)-design, (X,A), has degree at most k(r − 1). Further, all vertices in GA have degrees equal to k(r−1) if and only if |Ai ∩ A j| ≤ 1 for all

Configurations A (v, n, r, k)-design is called a (v, n, r, k)- configuration if any two distinct blocks intersect in zero or one point.

LEMMA 2 Suppose we use a (v, n, r, k)-design for a key ring space with intersection threshold q = 1. Then Pr1 ≤ k(r − 1)/(n − 1). Further, Pr1 = k(r− 1)/(n− 1) if and only if the (v, n, r, k)-design is a configuration.

LEMMA 3 A (v, n, r, k)-configuration exists only if nk = vr and v − 1 ≥ r(k − 1).

Complete Block Graphs The block graph of a configuration is a complete graph if and only if k(r − 1) = n − 1 n << k²

μ-Common Intersection Designs Two-hop paths Increase choices for best-match common neighbor

μ-Common Intersection Designs Suppose that (X,A) is a (v, n, r, k)- configuration. We say that (X,A) is a μ-common intersection design (or (v, n, r, k;μ)-CID) provided that whenever Ai ∩ A j = ∅.

Pr1 and Pr2 η - number of nodes in the intersection of the neighborhoods of the two nodes Ui and Uj.

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Linear Schemes A Tranversal design TD(k,m) is a Triple (X,H,A) X is a finite set of cardinality km H is a partition of X into k parts of size m A is a set of k-subsets of X called blocks * ** Every pair x,y from different groups occurs in exactly one block in A

Theorem If there exists a TD(k,m) then there is a (km, m*m,m,k;k*k-k)-CID Proof: it is not hard to see that a TD(k,m) has km points and m*m blocks, every block has size k, and every point ocuurs in m blocks

Proof cont’ Next, we show that (X,A) is a configuration Let A1, A2 be two blocks and suppose that Therefore there are 2 points x1, x2 such that from * x1 and x2 must be from different groups. from ** we get a contradiction

Proof cont’ Finally we show that (X,A) is a CID Suppose and where A and B are 2 disjoint blocks There is no block containing the pair but there is unique block containing any pair where Hence, the design is a common intersection design

LEMMA It is well-known (from previous articles) that if p is a prime or prime power, the TD(k,p) can be easily constructed.

Example

TD(30, 49) key ring space (1470, 2401, 49, 30)-1-design support up to 2,401 nodes in the network every node is required to store 30 keys

Local connectivity Pr1 and Pr2:

Local Connectivity

Resiliency

Network Size

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Quadratic Schemes A Tranversal design TD(t,k,m) is a Triple (X,H,A) X is a finite set of cardinality km H is a partition of X into k parts of size m A is a set of k-subsets of X called blocks * ** Every subset of t elements of X from t different groups occurs in exactly one block in A A TD(k,m) is identical to a TD(2,k,m)

Theorem Suppose (X,H,A) is a TD(3,k,m) Then every point occurs in exactly blocks, and every pair of points from different groups occurs in exactly m blocks. Further, any block intersects exactly blocks in one point, exactly blocks in two points, and is disjoint from exactly blocks

proof Let x,y be any 2 points from different groups. Let H be a group such that. Then for every, there is a unique block containing x,y, and z. Hence, there are m blocks containing x, y and some (because the size of H is m). Next, let x be any point and let H be any group such that. For every, there are m blocks containing x and z. The resulting blocks are distinct and account for all the blocks containing x (this follows from **). Now, let A be a block. There are ways to choose 2 points. For each such choice, there are m-1 blocks other than A that contain x and y.

Proof cont’ The resulting blocks are distinct and account for all the blocks that intersect A in exactly 2 points. Suppose there are blocks that intersect A in exactly i points, i=0,1,2. We have shown above that Now, suppose that. There are (m-1)(k-1) blocks that contain x and exactly one other point from A. There blocks intersect A in exactly 2 points. There remain blocks other than A that contain x. Since there are k points, it follows that. Finally, since the total number of blocks is, it follows that.

Example TD(3, 23, 23) each node in the network is required to store 23 keys

Local Connectivity

Resiliency

Network Size

Contents Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons

Performance Comparisons We will compare the following schemes for different parameter situations: –Basic schmes –1-composite and 2-composite schemes –Linear schemes –Quadratic schemes

Summarize All the schemes are able to support quite large networks. The basic, 1-composite and linear schemes require quite large key pools when k is large and Pr1 is small. The linear scheme has the simplest shared-key discovery. As Pr1 decrease the nodes must be distributed more densely in order to have good local connectivity. The quadratic and 2-composite schemes have the best resiliency when k and Pr1 are both large. There is a trade-off between connectivity and resiliency. In general, a larger value of k is beneficial for all the metrics considered.