+ All Categories
Home > Documents > SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks

Date post: 25-Feb-2016
Category:
Upload: jimbo
View: 47 times
Download: 3 times
Share this document with a friend
Description:
SPINS: Security Protocols for Sensor Networks. Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley. Sensor Networks are Emerging. Many applications Real-time traffic monitoring Seismic safety Energy efficiency Need secure communication protocols. - PowerPoint PPT Presentation
Popular Tags:
22
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug Tygar UC Berkeley
Transcript
Page 1: SPINS: Security Protocols for Sensor Networks

SPINS:Security Protocols for

Sensor Networks

Adrian PerrigRobert SzewczykVictor WenDavid CullerDoug Tygar UC Berkeley

Page 2: SPINS: Security Protocols for Sensor Networks

Sensor Networks are Emerging

Many applications• Real-time traffic monitoring• Seismic safety• Energy efficiency

Need secure communication protocols

Page 3: SPINS: Security Protocols for Sensor Networks

Sensors in Cory Hall

Page 4: SPINS: Security Protocols for Sensor Networks

Sample Sensor DataLightintensity

Temperature

HackerAttack!

Page 5: SPINS: Security Protocols for Sensor Networks

Security for Sensor Networks Authentication• Ensures data integrity & origin• Prevents injecting bogus messages

Confidentiality• Ensures secrecy of data• Prevents eavesdropping

Page 6: SPINS: Security Protocols for Sensor Networks

Challenge: Resource Constraints Limited energy Limited computation (4 MHz 8-bit) Limited memory (512 bytes) Limited code size (8 Kbytes)• ~3.5 K base code (“TinyOS” + radio encoder)• Only 4.5 K for application & security

Limited communication (30 byte packets) Energy-consuming communication• 1 byte transmission = 11000 instructions

Page 7: SPINS: Security Protocols for Sensor Networks

SPINS: Our Solution

SNEP• Sensor-Network Encryption Protocol• Secures point-to-point communication

TESLA• Micro Timed Efficient Stream Loss-

tolerant Authentication• Provides broadcast authentication

Page 8: SPINS: Security Protocols for Sensor Networks

System Assumptions Communication patterns• Frequent node-base station exchanges• Frequent network flooding from base• Node-node interactions infrequent

Base station• Sufficient memory, power• Shares secret key with each node

Node• Limited resources, limited trust

Page 9: SPINS: Security Protocols for Sensor Networks

SNEP Security Goals

Secure point-to-point communication• Confidentiality, secrecy• Authenticity and integrity • Message freshness to prevent replay

Why not use existing protocols?• E.g. SSL/TLS, IPSEC

Page 10: SPINS: Security Protocols for Sensor Networks

Asymmetric Cryptography is Unsuitable

Overhead of digital signatures• High generation cost O(minutes)• High verification cost O(seconds)• High memory requirement • High communication cost ~128 bytes

SNEP only uses symmetric crypto

Page 11: SPINS: Security Protocols for Sensor Networks

Basic Crypto Primitives

Code size constraints code reuse Only use block cipher encrypt function• Counter mode encryption• Cipher-block-chaining message

authentication code (MAC)• Pseudo-Random Generator

Page 12: SPINS: Security Protocols for Sensor Networks

SNEP Protocol Details A and B share• Encryption keys: KAB KBA

• MAC keys: K'AB K'BA

• Counters: CA CB

To send data D, A sends to B:

A B: {D}<KAB, CA>

MAC( K'AB , [CA || {D}<KAB, CA>] )

Page 13: SPINS: Security Protocols for Sensor Networks

SNEP Properties Secrecy & confidentiality• Semantic security against chosen ciphertext

attack (strongest security notion for encryption) Authentication Replay protection Code size: 1.5 Kbytes Strong freshness protocol in paper

Page 14: SPINS: Security Protocols for Sensor Networks

Broadcast Authentication Broadcast is basic communication mechanism Sender broadcasts data Each receiver verifies data origin

Sender

Bob

M

Carol

M

DaveAlice MM

Page 15: SPINS: Security Protocols for Sensor Networks

Simple MAC Insecure for Broadcast

Sender

Alice

K

K

M, MAC(K,M)

Bob

K

M, MAC(K,M)

M', MAC(K,M')

Page 16: SPINS: Security Protocols for Sensor Networks

TESLA: Authenticated Broadcast

Uses purely symmetric primitives

Asymmetry from delayed key disclosure

Self-authenticating keys

Requires loose time synchronization

• Use SNEP with strong freshness

Page 17: SPINS: Security Protocols for Sensor Networks

TESLA Quick Overview I Keys disclosed 2 time intervals after use Receiver knows authentic K3

K4 K5 K6 K7

tTime 4 Time 5 Time 6 Time 7

K3

P2

K5

P1

K3

Authentication of P1: MAC(K5, P1 )

FFAuthenticate K5

Verify MAC

FK6FK5

Page 18: SPINS: Security Protocols for Sensor Networks

TESLA Quick Overview II Perfect robustness to packet loss

K4 K5 K6 K7

tTime 4 Time 5 Time 6 Time 7

K3

P5

K5

P3

K3

P2

K2

P1

K2

Verify MACs

P4

K4

FFAuthenticate K5

Page 19: SPINS: Security Protocols for Sensor Networks

TESLA Properties

Low overhead (1 MAC)• Communication (same as SNEP)• Computation (~ 2 MAC computations)

Perfect robustness to packet loss Independent of number of receivers

Page 20: SPINS: Security Protocols for Sensor Networks

Energy Cost for Sending a Message

Security Computation 2%

MAC transmission21%

Datatransmission

77%

Typical packet size: 28 bytes

Page 21: SPINS: Security Protocols for Sensor Networks

Related Work in Broadcast Authentication Symmetric schemes• Link-state routing updates [Cheung ’97]• Multi-MAC [Canetti et al. ’99]

Asymmetric schemes• Merkle hash tree [Wong & Lam ’98]

Chained hashes• EMSS [Perrig, Canetti, Tygar, Song ’00]• [Golle & Modadugu ’01]• [Miner & Staddon ’01]

Hybrid schemes• Stream signature [Gennaro & Rohatgi ’97]• K-times signature [Rohatgi ’99]

Page 22: SPINS: Security Protocols for Sensor Networks

Conclusion Strong security protocols affordable• First broadcast authentication

Low security overhead• Computation, memory, communication

Apply to future sensor networks• Energy limitations persist• Tendency to use minimal hardware

Base protocol for more sophisticated security services


Recommended