Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F. Bao Presenter: Jianying Zhou.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security Issues in Wireless Sensor Networks -Ninad Naik.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid Rong Jiang
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Computer Science 1 Efficient Self-healing Group Key Distribution With Revocation Capability Archana Rajagopal CSC 774 Presentation Based on Original Slides.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin Date: March 13, 2007.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Avoiding Energy Holes in Wireless Sensor Network with Nonuniform Node Distribution Xiaobing Wu, Guihai Chen and Sajal K. Das Parallel and Distributed Systems.
On Tree-Based Convergecasting in Wireless Sensor Networks V. Annamalai, S. K. S. Gupta, L. Schwiebert IEEE 2003 Speaker : Chi-Chih Wu.
Security Solutions for Wireless Sensor Networks 姓名 : 曹倫誠 學號 : Date:2010/06/07.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
WIRELESS SENSOR NETWORKS: POWER RELATED ISSUES Jay Wiley, # CSE 7344,Computer Networks and Distributed Systems II Dr. Golla.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Multimedia & Networking Lab
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
A Distributed Paging RAM Grid System for Wide-Area Memory Sharing Rui Chu, Yongzhen Zhuang, Nong Xiao, Yunhao Liu, and Xicheng Lu Reporter : Min-Jyun Chen.
Xiaobing Wu, Guihai Chen
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Computationally Secure Hierarchical Self- Healing Group Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Authors: N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi
Collaborative Broadcasting and Compression in Cluster-based Wireless Sensor Networks Anh Tuan Hoang and Mehul Motani National University of Singapore Wireless.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
Abstract 1/2 Wireless Sensor Networks (WSNs) having limited power resource report sensed data to the Base Station (BS) that requires high energy usage.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Energy Efficient Data Management in Sensor Networks Sanjay K Madria Web and Wireless Computing Lab (W2C) Department of Computer Science, Missouri University.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Presented by: Saurav Kumar Bengani
Xiaobing Wu, Guihai Chen and Sajal K. Das
Aziz Nasridinov and Young-Ho Park*
Seema Bandyopadhyay and Edward J. Coyle
Chi Zhang, Yang Song and Yuguang Fang
Presentation transcript:

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F. Bao Presenter: Jianying Zhou

Content Introduction Heterogeneous WSN Architecture Hierarchical Self-healing group Key Distribution Scheme Conclusion

Introduction Heterogeneous WSN Architecture Hierarchical Self-healing group Key Distribution Scheme Conclusion

Wireless Sensor Networks Wireless Sensor Networks (WSNs)

Self-healing Group Key Distribution Key Distirubtion & Management is Fundamental to Other Security Issues –Pairwise key distribution –Group key distribution Self-healing group key distribution especially suits WSNs’ lossy channel.

All Existing Work Consider Homogeneous WSNs Homogeneous WSN –All sensor nodes have the same capability –Homegeneous WSNs have scalability problem. Theoretical and empirical studies have corroborate this Homogeneous WSNs

Hierarchical Self-healing Key Distribution Motivated to Study Self-healing Group Key Distribution for Heterogeneous WSNs Hierarchical Self-healing Group Key Distribution –Adapting to the heterogeneous WSN architecture

Introduction Heterogeneous WSN Architecture Hierarchical Self-healing group Key Distribution Scheme Conclusion

Heterogeneous WSNs Heterogeneous WSNs Are A Better Alternative to Homogeneous ones –The network is partitioned into clusters, and each cluster is placed a cluster head –Cluster heads have better capability than sensor nodes –A cluster head acts an intermediary between sensor nodes and the base station

Heterogeneous WSNs

Introduction Heterogeneous WSN Architecture Hierarchical Self-healing group Key Distribution Scheme Conclusion

Key Hierarchy

Key Generation rK = [rk 1, rk 2 ] mK i = [mk 1, mk 2 ] =[h(G i,rk 1 ), h(G i,rk 2 )] gK i = …

Key Generation gK i [j] = k R [m-j+1]+k F [j] k R [j] = h R j (mk 1 ) = h R (h R (h R (…h R (mk 1 )))) k F [j] = h F j (mk 2 ) = h F (h F (h F (…h F (mk 2 )))) reverse hash chain foward hash chain

Key Distribution mk 2 is given to each sensor as seed s F for the forward hash chain At the start of each session, the group manager generates k R [m-j+1] using mk 1 as seed for the reverse hash chain, and broadcasts to sensors within its group –The broadcast scheme is essentially the Dutta et al.’s scheme, with a slight modification to rectify its weakness

Key Distribution The reverse hash chain is used to achieve self-healing property The forward hash chain is used to forward secrecy, i.e., sensors joined later cannot compute group keys of earlier sessions

Introduction Heterogeneous WSN Architecture Hierarchical Self-healing group Key Distribution Scheme Conclusion

Heterogeneous WSNs Have Better Scalability and Performance, As the Introduction of Powerful Group Managers Provides Shortcut for Data Transmission from Sensors to Base Station We Proposed Hierarchical Self-healing Group Key Distribution Tailored to Heterogeneous WSNs For This Scheme, We Assume Group Managers are Trusted. In the Original Submission, We Have a Scheme Handling Untrusted Group Managers

Thank You!