Presentation is loading. Please wait.

Presentation is loading. Please wait.

WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME

Similar presentations


Presentation on theme: "WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME"— Presentation transcript:

1 WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
Presented By: Mohammed Saleh CS 599a Fall06

2 WSN Background WSN Architecture WSN Security Issues and requirements
Approach

3 Background 100/1000 nodes Low cost solution Limited resources
Controlled or uncontrolled environment

4 WSN Architecture

5 WSN Architecture A sensor Nodes Consist of: Battery Memory Processor
Radio links for communicating

6 Sensor Node Constraints
Battery Power/ Energy Processor Rechargeability Sleep Patterns Memory

7 Network constraints Limited Pre-Configuration
Unreliable communications Frequent Routing Changes

8 WSN Architecture

9 WSN Architecture

10 Security in Wireless Networks

11 Security Requirements
Confidentiality Authenticity Integrity Freshness Scalability Availability Accessibility Self-Organization Flexibility

12 Security in Wireless Networks
Attacks Poor physical protection Attacks not only from outside but also from within the network from compromised nodes.

13 WSN Attacks

14 Security in Wireless Networks
Security concepts: Cryptography - Public/private key Diffie hellman

15 Group key protocol key establishment protocols can be classified into two categories: Group key management - Group key is usually created and updated by a central key server, and then securely distributed to all members. Tree-based key management - each node contributes a fraction of the group key and the creation and update of group key are the joint work of all members.

16 Group key management Proposed approach:
We propose a security protocol that takes advantage of a group key management scheme for a hierarchical sensor network. Our scalable algorithm is based on modifying a classic security protocol by the modification to the multi party Diffie-Hellman protocol to accommodate sensor networks.

17 Group Key Mgmt

18 References SEYIT A. C¸AMTEPE and B¨ ULENT YENER, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. Technical Report TR (March 23, 2005). David W. Carman, Peter S. Kruus, and Brian J.Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varshney. A Key Management Scheme for Wireless Sensor Networks Using DeploymentKnowledge. IEEE INFOCOM, 2004. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM conferenceon Computer and Communications security, Washington, DC, USA, November Biswajit Panja, Review Paper for PhD Research Readiness, Key Management for Secure Sensor Networks

19 References RSA Encryption Standard, Version 1.4. San Mateo, Ca.: RSA Data Security, Inc., 1991. W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), Multicast Security: A Taxonomy and Efficient Constructions. IEEE Press, 1999. Ten Emerging Technologies That Will Change The World, Feb.2003. Mihaela Cardei My T. Thai Yingshu Li Weili Wu, Energy-Efficient Target Coverage in Wireless Sensor Networks, IEEE INFOCOM 2005. A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer 35(10):54–62, 2002. J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM Press, 2004. Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary Department of Computer Science Wayne State University5143 Cass Ave, MI 48202, USA

20 References J. Deng, R. Han, and S. Mishra. Countermeasuers against traffic analysis in wireless sensor networks. Tech. Rep. CU-CS , University of Colorado at Boulder, 2004. Peng Peng , P2P-HGKM: An Efficient Hierarchical Group Key Management Protocol for Mobile Ad-Hoc Networks, B.Sc., Peking University, 2000 Eric Ricardo Anton, Otto Carlos Muniz Bandeira Duarte, Group Key Establishment in Wireless Ad Hoc Networks , Workshop em Qualidade de Serviço e Mobilidade – 2002.


Download ppt "WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME"

Similar presentations


Ads by Google