TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.

Slides:



Advertisements
Similar presentations
TinySec: Security for TinyOS C. Karlof, N. Sastry, D. Wagner November 20, 2002.
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
TinySec: Security for TinyOS Chris Karlof Naveen Sastry David Wagner January 15, 2003
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam.
Security Issues In Sensor Networks By Priya Palanivelu.
Wired Equivalent Privacy (WEP)
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry, David Wagner SenSys 2004.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry, David Wagner Presented by Paul Ruggieri.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
TinySec: Performance Characteristics Chris K :: Naveen S :: David W January 16, 2004.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Security Considerations for IEEE Networks Karthikeyan Mahadevan.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP Protocol Weaknesses and Vulnerabilities
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Network Security David Lazăr.
Security for Sensor Networks: Cryptography and Beyond David Wagner University of California at Berkeley In collaboration with: Chris Karlof, David Molnar,
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Security in WSN Vinod Kulathumani West Virginia University.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
TinySec: Performance Characteristics Chris K :: Naveen S :: David W January 16, 2004.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Presentation Road Map 1 Authenticated Encryption 2 Message Authentication Code (MAC) 3 Authencryption and its Application Objective Modes of Operation.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Cryptography CSS 329 Lecture 13:SSL.
Future Internet: Sensor Networks Security Yongkoo Han.
Message Authentication Code
TinySec: Security for TinyOS
IEEE i Dohwan Kim.
Security Of Wireless Sensor Networks
Outline Using cryptography in networks IPSec SSL and TLS.
Security of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Aggregation.
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
CRYPTOGRAPHY & NETWORK SECURITY
Counter With Cipher Block Chaining-MAC
Lightweight Security Scheme for Vehicle Tracking System Using CoAP
Presentation transcript:

TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007 1

2 What is ??? Tiny OS Wireless Sensor Network Tiny Sec Link layer

Contents Motivation & TinySec Contributions by the paper. Difference between Sensor Networks and Other Networks. Security threats in WSN. What is TinySec and its goal. Why Link Architecture. Design Goals. Security Primitive. Design of TinySec. Modes of Encryption and their drawbacks. Security Analysis of TinySec. Implementation and Evaluation. 3

What was the motivation ??? Sensor Networks : Resource Constraint networks, small memory, weak processor, limited energy, less Bandwidth. 80 % of all wireless networks operate in the clear i.e. without cryptographic protection Need for an architecture which could change things around. – TinySec SW / HW 4

Contributions of this paper To introduce TinySec as a protocol for link layer cryptography in Sensor Networks. To Measure the bandwidth, latency and energy costs of TinySec. To encourage people to volunteer and perform research in further higher level of protocols. 5

What is the Difference between WSN and other Network ? WSN Bandwidth - less Devices have very little computational power Energy is less with Wireless Sensor devices Wireless Networks are difficult to protect Vulnerable to resource consumption Information – Hop by Hop. Other Networks Bandwidth –more Comparatively devices have more computational power. Energy for devices in other networks is high. Comparatively much easier to protect. Not Vulnerable to resource consumption. Information- end to end (not necessary for all networks) 6

Security Threats in WSN WSN are difficult to protect. WSN are in a Broadcast medium WSN are vulnerable to resource consumption attacks. Intruders can waste network bandwidth 7

What is TinySec and its Goal … Lightweight link layer Security Mechanism for Sensor Networks. Goal : Is to minimize the overhead with reasonable protection from – Energy – Bandwidth – Latency 8

Why Link Architecture ??? Conventional networks – authenticity and integrity, confidentiality – end to end mechanism (SSH, SSL). End to end Security is vulnerable to DOS (Denial of Attacks). Message integrity should not be checked at the end alone. 9

Design Goals Security – Access control – Message integrity – Message confidentiality Performance – Energy – Bandwidth – etc. Ease of use MESSAGE AUTHENTICATION CODE ENCRYPTION DECREASE MESSAGE LENGTH PUT IN TinyOS 10

Security Primitive Message Authentication code – A cryptographic checksum for checking the message integrity -MACMAC 11

Security Primitives (cont.) Encrypting the same plain text two times should get two different cipher texts Initialization Vectors ( IV) -A side input to the Encryption Algorithm -Not kept secret, sent with the message. 12 MESSAGE (YES/NO) + shared key

Why design TinySec ?? Why Design TinySec when existing protocols are present. - IPSec,SSL / SSH are too heavy weight to be used in Sensor Networks. -The packet format adds many bytes of overhead and they were not being designed to built on WSN. 13

Design of TinySec Two different security Options --Authentication Encryption TinySec –AE --Authenticated only – TinySec – Auth In both the cases the data is authenticated with MAC and thus maintaining Data Integrity. 14 Header MACs HeaderMessageMAC Message encrypted

How can we Encrypt ?? Requirements for encryption – To select an encryption scheme – To specify the IV format – 8 Byte IV format 15 CIPHER BLOCK CHAINING : CBC

Different modes of Encryption A stream Cipher uses a Key and IV. Together they are ex-ored with message to get the cipher text (C = M+K.IV). Drawbacks :- If same IV is used to encrypt 2 different packets then there is a possibility of retrieving both the packets. 16 Symmetric key encryption schemes Modes of operation using block cipher Stream Ciphers

What is CBC mode of Encryption?? Link – Link In (CBC) mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. XORed This way, each ciphertext block is dependent on all plaintext blocks processed up to that point. 17

Drawbacks of CBC Mode. Given two plaintexts P and P’.If the IV used for the two plaintexts are same then there exists a possibility that the length of the longest shared message is shared / known. 18

How does the packet format for TinySec Looks like ?? 19 Dest : Destination address AM : Active Message Handler type L: length of the data Src : source of the address

Security Analysis of TinySec Message Integrity and Authenticity Security of a CBC –MAC is proportional to the length of the MAC. Choice of 4 bytes MAC ?? 20

Implementation of TinySec Implemented on Berkeley Sensor Nodes Integrated into TOSSIM simulator 3000 Lines of nesC code Works in FIFO format Thus TinySec has got 2 priority Schedulers 21

Evaluation Energy Consumption Power Consumption Bandwidth - Energy : 24 bytes of data was transmitted 22

Evaluation 23

Evaluation (Cont) Since the power consumed by TinySec-AE is maximum ( for majority of time )the energy consumed by TinySec –AE will also be maximum While sending with TinySec the packets are also larger in length 24

Bandwidth To measure Bandwidth- 24 bytes packets were sent using TinyOS, TinySec –Auth, Tiny-Auth Enc. Measured the number of packets that were successfully received. 25

26

Conclusions We have learnt that there are design vulnerabilities in the conventional protocols for sensor networks. TinySec addresses this with extreme careful design and takes advantage of the limitations of Sensor Networks 27

References yers.asp 10_2004_fall/rhoyo.ppt des_of_operation#Cipher- block_chaining_.28CBC.29 28