Top Banner
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter 呂呂呂 1
22

Providing Transparent Security Services to Sensor Networks

Jan 19, 2016

Download

Documents

feryal

Providing Transparent Security Services to Sensor Networks. Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍. Outline. Introduction Problem Formulation Related Work Key Management Module Proposed Security Platform Conclusion References. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Providing Transparent Security Services to Sensor Networks

Providing Transparent Security Services to Sensor NetworksHamed Soroush, Mastooreh Salajegheh

and Tassos DimitriouIEEE ICC 2007

Reporter :呂天龍

1

Page 2: Providing Transparent Security Services to Sensor Networks

Outline

• Introduction• Problem Formulation• Related Work• Key Management Module• Proposed Security Platform• Conclusion• References

2

Page 3: Providing Transparent Security Services to Sensor Networks

Introduction(1/1)• Sensor networks are usually deployed in hostile

environments, many of their applications require that data must be exchanged in a secure and authenticated manner.

• Public key cryptography is also considered to be computationally expensive for WSN.

• Any WSN security protocol has to be flexible and scalable enough to easily allow nodes to join or leave the network.

3

Page 4: Providing Transparent Security Services to Sensor Networks

Problem Formulation(1/2)

• A few reasonable assumptions:

1. Sensor nodes in the network are not mobile.

2. The base station is safe and adversaries cannot compromise it.

4

Page 5: Providing Transparent Security Services to Sensor Networks

Problem Formulation(2/2)

• Requirements for a practical WSN security platform:

1. Flexibility2. Scalability3. Transparency4. Lightweightness5. Node Capture Resistance6. Simplicity

5

Page 6: Providing Transparent Security Services to Sensor Networks

Related Work(1/3)

6

Page 7: Providing Transparent Security Services to Sensor Networks

Related Work(2/3)

• three major approaches for key management in WSN:

1) Deterministic pre-assignment

2) Random pre-distribution

3) Deterministic post-deployment derivation

7

Page 8: Providing Transparent Security Services to Sensor Networks

Related Work(3/3)

8

Page 9: Providing Transparent Security Services to Sensor Networks

Key Management Module(1/4)

• Key establishment module establishes the following kinds of keys:

1) Pair-wise (PW) key:

2) Broadcast (BC) key:

3) Node-Base (NB) key:

K : global master key F : hash function

9

)||||( KnAddressbaseStatioiFNBi

)||),max(||),(min(, KjijiFPW ji

)||( KiFBCi

Page 10: Providing Transparent Security Services to Sensor Networks

Key Management Module(2/4)

10

Page 11: Providing Transparent Security Services to Sensor Networks

Key Management Module(3/4)

• The memory overhead of our key management module for each node can be calculated as follows:

• |BC|,|PW| and |NB| : size of broadcast key, pair-wise key and node-base key.

• d : the maximum number of neighbors each node may have.

11

||]|)||[(| NBdPWBCMOverhead

Page 12: Providing Transparent Security Services to Sensor Networks

Key Management Module(4/4)

12

Page 13: Providing Transparent Security Services to Sensor Networks

Proposed Security Platform(1/6)

• This platform provides security against several types of attacks as follows:

Replay Attacks: use the increasing counter value to guarantee the freshness of the messages.

Node Capture Attacks

Denial of Service Attacks: detect unauthorized packets before delivering them to application layer for further processing and stop them from spreading into the network.

13

Page 14: Providing Transparent Security Services to Sensor Networks

Proposed Security Platform(2/6)

• Message Modification and Impersonation Attacks: message Authentication Codes (MAC) can be used to let the receiver nodes detect any modifications of received messages from the original one.

Attacks on Confidentiality: appropriate encryption mechanisms

14

Page 15: Providing Transparent Security Services to Sensor Networks

Proposed Security Platform(3/6)

15

Page 16: Providing Transparent Security Services to Sensor Networks

Proposed Security Platform(4/6)

16

Page 17: Providing Transparent Security Services to Sensor Networks

Proposed Security Platform(5/6)

1) Authentication, Access Control and Integrity (A): the Counter field is not required, but obviously the MAC field is needed.

2) Confidentiality (C): source and Counter fields are used in the packet format , however receiver nodes do not save the related counter values.

17

Page 18: Providing Transparent Security Services to Sensor Networks

Proposed Security Platform(6/6)

3) Replay Attack Protection (R): Source and Counter fields are also necessary, but the counter value of each neighbor is kept.

18

Page 19: Providing Transparent Security Services to Sensor Networks

Conclusion(1/2)

• post-distribution key management module allowing for the provision of several security services such as acceptable resistance against node capture attacks and replay attacks.

• lightweight and allows for high scalability while being easy to use and transparent to the users.

19

Page 20: Providing Transparent Security Services to Sensor Networks

Conclusion(2/2)

• This platform is flexible enough to allow different types of security services for different types of communications among nodes.

20

Page 21: Providing Transparent Security Services to Sensor Networks

References(1/2)[1] C. Karlof, N.Sastry, D. Wagner, “TinySec: Link Layer Encryption for

Tiny Devices”, ACM SenSys, 2004[2] A. Perrig, R. Szewczyk, V. Wen, D. culler, D. Tygar, “SPINS: Security

Protocols for Sensor Networks”, ACM CCS, 2003[3] Q. Xue, A. Ganz, “Runtime Security Composition for Sensor

Networks (SecureSense)”, IEEE Vehicular Technology Conference, 2003

[4] S. J. S. Zhu, S. Setia, “LEAP: Efficient security mechanism for large-scale distributed sensor networks”, ACM CCS, 2003

[5] T. Li, H. Wu, F. Bao, “SenSec Design”, Institue for InfoComm Research, Tech. Rep. TR-I2R-v1.1, 2005

[6] H. Chan, A. Perrig, “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks”, Proceedings of IEEE Infocom, 2005

[7] S.Capkun, J.P. Hubaux, “Secure positioning of wireless devices with application to sensor networks”, IEEE Infocom, 2005

21

Page 22: Providing Transparent Security Services to Sensor Networks

References(2/2)[8] S. Ganeriwal, S. Capkun, C. C. Han, M. B. Srivastava, “Secure time

synchronization service for sensor networks”, ACM WiSe, 2005[9] L. Eschenauer and V. D. Gligor, “A key-management scheme for

distributed sensor networks”, ACM CCS, 2002[10] H. Chan, A. Perrig, D. Song, “Random Key Predistribution Schemes

for Sensor Networks”, IEEE Symposium on Security and Privacy,  2003

[11] D. Liu, P. Ning, “Establishing pairwise keys in distributed sensor networks”, ACM CCS, 2003

[12] J. Hill, et al, “System architecture directions for networked sensors”, in Proceedings of ACM ASPLOS IX, 2000

[13] Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: Proc. of the Second Usenix Workshop on Electronic Commerce,  (1996) 1–11

22