+ All Categories
Home > Documents > S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Date post: 11-Jan-2016
Category:
Upload: hugo-warren
View: 212 times
Download: 0 times
Share this document with a friend
17
Security IN WIRELESS SENSOR NETWORKS Prepared by: Ahmed ezz-eldin
Transcript
Page 1: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

SecurityIN

WIRELESS SENSOR NETWORKS

Prepared by: Ahmed ezz-eldin

Page 2: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Key Management Approaches

•"Pairwise key establishment" is the fundamental security service allowing nodes to communicate in cryptographic way

•Due to limited resources we can't use any of: -Public-Key-Cryptography -Key-Distribution-Center used in traditional networks.

•Instead, we use: Key Pre(before deployment) - schemes

Page 3: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Key Pre-distribution Schemes

•Symmetric-key schemes:"one key for encryption and decryption"

1-Unique Random key.2-Networkwide shared key.3-Probabilistic key pre-distribution.4-Polynomial based key pre-distribution.

•Public-key schemes:"one key for encryption, while the other for decryption"

1-Elliptic Curve Cryptography.

Page 4: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Unique Random Key

•Each node is assigned unique random key.

•To communicate with any node, must use its key.

•Introduces huge storage overhead: network of n nodes, each must store (n-1) keys.

Page 5: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Networkwide Shared Key

•Master/Global key used by all nodes.

•Compromise of even a single node would reveal the secret key and allow decryption of all traffic.

•One variant is to establish a set of link keys with other neighbornodes, then erase the master key.

•Does not allow new nodes to be deployed.

Page 6: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Probabilistic Key Pre-distribution

•Setup server generates large pool of random keys each is assigned unique ID.

•Each node randomly picks subset of keys from the key pool and their Ids.

•Any 2 nodes can communicate with each other if share a common key.

Page 7: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•After deployment, two nodes need to communicate, send list of key IDs they hold, and use common keys for communication.

•The probability of sharing at least one common key is as follows:S : key Pool size.S': Subset size at node.

•If don't have a common key .... need to find number of other nodes to help establish a session key ( called path key ).

Page 8: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•This technique needs less memory and can guarantee a high probability of sharing common key between two nodes.

•But small number of compromised nodes will disclose a large fraction of secrets, as single key may be shared by more than two nodes.

•For more security, q-composite scheme is proposed, where two nodes setup pairwise key iff they share at least q-common keys.

Page 9: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Polynomial key Pre-distribution

•The Setup server randomly generates a bivariate t-degree polynomial over finite field Fq, where f(x,y)=f(y,x).

•For node with id i, setup server will compute polynomial share of f(x,y)->f(i,y) which is pre-loaded for node i.

Page 10: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•Nodes i and j, can compute common key f(i,j) as follows: -node i evaluates f(i,y) at point j gets f(i,j). -node j evaluates f(j,y) at point j gets f(j,i).

•Each node needs "(t+1)log q" storage places to store polynomial f(i,x).

•Large mathematical overhead.

•However, no communication overhead, as what is needed is the id of the other node.

Page 11: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

Elliptic Curve Cryptograhy

•ECC is a lightweight type of public key cryptography.

•Usually used in heterogeneous sensor networks.

•Sensor network contains nodes, gateways and base-station.

•Gateways are powerful in terms of energy, computation and memory.

•Before deployment, server generates and pre-loads keys based on ECC into senosr and gateways as follows:

Page 12: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•Sensor node is pre-loaded with:Unique id.

Its own public and private keys. Public key of all gateways in the network.

•Gateway is pre-loaded with:Unique id.Its own public and private keys.Public key of the base station.public key of all sensor nodes in the network.

•Sensor nodes are randomly deployed.

•Gateways are deployed such that each node can hear form at least one gateway.

Page 13: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Page 14: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•Each gateway Gj broadcasts message Bj to all sensor nodes.

•Each node selection will be based on Signal-to-Noise-Ratio.

•Each sensor node ni can verify the message using the public key of the gateway.

Page 15: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•Sensor node sends a session-key request to the gateway node, holding list of its neighbors ni'.

•Gateway sends the ECC encrypted pairwise key between the node i and its neighbor node I'.

•Node i decrypts the message received.

Page 16: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

•Assuming that gateways are tamper proof.

•An adversary is unable to impersonate the identity of any node except by capturing it.

•Obviously capturing node ni reveals:Its (PUi , PRi )Pubic key of all gatewaysReveals no info of links not communicate directly with it.

• Capturing node does not effect the security of the rest nodes, as no reveal for private keys of other nodes.

Page 17: S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.

References

*"A Key Management Scheme for Cluster Based Wireless Sensor Networks" 2008 IEEE/IFIP International Conference.*"Security in wireless sensor networks" communication of the ACM june 2004/Vol 47.*"Security for wireless sensor networks" Advances in information security springer.*"Analyzing the Key Distribution from Security Attacks in Wireless Sensor" Piya Techateerawat and Andrew Jennings.*"Secure Clustering and symmetric key establishment in heterogeneous wireless sensor newtorks"Research article Reza Azarderskhsh and Arash reyhani.*"Cryptography and Security in Wireless Sensor Networks" Pyrgelis Apostolos, University of Patras.*”Security and Privacy in Sensor Networks” Haowen Chan and Adrian Perrig, Carnegie Mellon University.


Recommended