SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.

Slides:



Advertisements
Similar presentations
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Advertisements

A Survey of Secure Wireless Ad Hoc Routing
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Cryptography for Backup Navigation
Security Issues In Sensor Networks By Priya Palanivelu.
Wired Equivalent Privacy (WEP)
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Timed Efficient Stream Loss-Tolerant Authentication. (RFC 4082) Habib Moukalled 1/29/08.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
1 Ad Hoc Networks Security Instructor: Carlos Pomalaza-Ráez Fall 2003 University of Oulu, Finland.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
1 Sensor Networks Security and Privacy in Sensor Networks Haowen Chan and Adrian Perrig SPINS Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
1 Timed Efficient Stream Loss-tolerant Authentication.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Security Introduction Class February Overview  Security Properties  Security Primitives  Sample Protocols.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORK Presented by Chetan Rana U08CO213.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
SPINS: Security Protocols in Sensor Networks
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Wireless Sensor Networks Security and Privacy Professor Jack Stankovic Department of Computer Science University of Virginia.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Security in Wireless Sensor Networks by Toni Farley.
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
By Prateek Arora Security for Sensor Networks By: Prateek Arora.
Security for Broadcast Network
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
Author: Na Ruan, Yoshiaki Hori Published in:
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
Presented by: Reut Barazani Limor Levy. Contents Introduction Digital signature broadcast message authentication TESLA broadcast message authentication.
SPINS: Security Protocols for Sensor Networks
CSCE 715: Network Systems Security
SPINS: Security Protocols for Sensor Networks
Security Of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context of Crisis Management and Societal Security Dennis K. Nilsson

Sensor Networks Measurement Control Sensor node limitations Processing power Storage Bandwidth Energy

Security Possible? Current security algorithms Computational and memory expensive Authenticated broadcasting Communication overhead TESLA – suitable for desktop workstations

Agenda System Description Security Requirements SNEP – Sensor Network Encryption Protocol µTESLA – Authenticated broadcast Implementation and Evaluation Conclusion

System Description Nodes and powerful base stations Communication Node to base station Base station to node Base station to all nodes Trust base stations but not Individual nodes Wireless communication Design Symmetric cryptography – single block cipher for all cryptographic primitives

Security Requirements Data confidentiality Sensitive data should be kept secret Data authentication Receiver verifies data was sent from claimed sender Data integrity Ensures the receiver that data is unaltered in transit Data freshness Implies that data is recent and not replayed

SNEP Data confidentiality Two-party data authentication Data integrity Data freshness Prerequisites: Shared secret key (master key) between each node and the base station

SNEP Low communication overhead 8 bytes per message Does not transmit counter Keep state at both end points Achieves semantic security Randomization using shared counter

SNEP Encryption E = {D} MAC M = MAC(Kmac,C|E) Message from A to B A → B: {D}, MAC(Kmac,C|{D} )

µTESLA Redesign of TESLA protocol TESLA not suitable for sensor networks Authenticates initial packet with a digital signature Overhead of 24 bytes per packet (sensor node packet size ~30 bytes) Disclose key for previous intervals with every packet One-way key chain does not fit in memory

µTESLA Base station broadcasts authenticated messages to the nodes Base station and nodes loosely time synchronized Base station computes MAC on a packet with a key that is secret at that time Receiving node can verify that corresponding MAC key has not been disclosed MAC key chain – K i = F(K i+1 )

µTESLA - Example time P1 K0K0 P2P3P4P5 K1K2 P7P6 F K1K1 K2K2 F K3K3 F K4K4 F K3K4

µTESLA – Example, dropped msg time P1 K0K0 P2P3P4P5 K1K2 F K2K2 K1K1 F 12340

µTESLA Sender setup Generate one-way key chain of length n from randomly chosen K n Time is divided time intervals Each key is associated with one interval Bootstrap receiver A commitment of the key chain is stored in receiver, subsequent keys are self- authenticated

µTESLA Authenticating broadcast packets Receiver must ensure attacker does not know the disclosed key used for MAC (i.e., sender has not disclosed key yet) Sender-receiver must be loosely time synchronized and receivers must know the key disclosure schedule Authenticate received key K j : K i = F j-i (K j )

Implementation and evaluation RC5 block cipher small code size and high efficiency but 32-bit data rotates (8-bit CPU) Encryption Counter mode (same function for encryption and decryption) Random-number generation MAC(K rand,C) MAC CBC-MAC: {M}K encr, MAC(K mac,{M}K encr ) Key setup K encr, K mac, K rand derived from master key

Implementation and evaluation Code size Crypto library and protocol implementation – 2kB of program memory Performance Key setup 8000 cycles, 8-byte encryption 120 cycles, twenty 30-byte messages per second Energy costs Encrypting and signing: 6 bytes overhead per message (~20%) MAC computation 2%

Applications Authenticated routing Route discovery through periodic broadcast of beacons Combine µTESLA key disclosure with distribution of routing beacons Node-to-node key agreement Symmetric key protocol using base station as a trusted agent for key setup Base station generates and distributes key to nodes A and B using SNEP

Conclusion Designed and implemented security protocols for sensor networks Authenticated and confidential communication Authenticated broadcast Use symmetric cryptography Code reuse Communication costs are small Many elements of the design are universal and can be applied to other sensor networks