Top Banner
Random Key-Assignment for Secure Wireless Sensor Networks Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei
29

Random Key-Assignment for Secure Wireless Sensor Networks

Feb 23, 2016

Download

Documents

Dionne Norman

Random Key-Assignment for Secure Wireless Sensor Networks. Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei. Sensor nodes. Limited memory Limited computational power Limited energy. Secure microcontroller. Threat Model. Passive attacks Cipher text attacks Active attacks - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Random Key-Assignment for Secure Wireless Sensor Networks

Random Key-Assignment for Secure Wireless Sensor

NetworksRoberto Di Pietro, Luigi V. Mancini and

Alessandro Mei

Page 2: Random Key-Assignment for Secure Wireless Sensor Networks

Limited memory Limited computational power Limited energy

Sensor nodes

Page 3: Random Key-Assignment for Secure Wireless Sensor Networks

Secure microcontroller

Page 4: Random Key-Assignment for Secure Wireless Sensor Networks

Passive attacks◦ Cipher text attacks

Active attacks◦ Take control of a sensor node

Unfriendly environment Nodes only trust themselves

Threat Model

Page 5: Random Key-Assignment for Secure Wireless Sensor Networks

Secure pairwise communication Memory efficient Energy efficient Tolerate the collusion of a set of corrupted

sensors

Goals

Page 6: Random Key-Assignment for Secure Wireless Sensor Networks

Have one master key◦ Can’t tolerate nodes being taken over

Each node stores a seperate key for every other node◦ Requires too much space◦ Expensive to add more nodes later

Tradeoff◦ Use less memory, but have only a probabilistic

tolerance to nodes being taken over

Naïve solutions

Page 7: Random Key-Assignment for Secure Wireless Sensor Networks

One way hash function Symmetric encryption Keyed hashed function Pseudo-random number generator

Requirements

Page 8: Random Key-Assignment for Secure Wireless Sensor Networks

A key deployment scheme A key discovery procedure A security adaptive channel establishment

procedure

The direct protocol

Page 9: Random Key-Assignment for Secure Wireless Sensor Networks

Method used in A key-managementscheme for distributed sensor networks:

A pool of P random keys is generated Each sensors takes k random keys from the

pool

Key deployment

Page 10: Random Key-Assignment for Secure Wireless Sensor Networks

Challenge is encrypted using each key and then broadcasted

Needs to perform k^2 decryptions on receiver side and k encryptions on the sender side

At least k messages have to be sent

Inefficient key discovery

Page 11: Random Key-Assignment for Secure Wireless Sensor Networks

Also used in A key management scheme for distributed sensor networks

Instead of challenge response, submit the indexes

Less secure, as a smart attacker can easily find the nodes that have the key it wants

Key deployment II

Page 12: Random Key-Assignment for Secure Wireless Sensor Networks

Method used in Establishing pair-wise keys forsecure communication in ad hoc networks: Aprobabilistic approach: A pool of P random keys is generated k indexes into the pool are created pseudo-

randomly with a publicly known seed dependent on the node id.

Less secure than challenge-response, but can be improved

Key deployment III

Page 13: Random Key-Assignment for Secure Wireless Sensor Networks

Channel existence

Page 14: Random Key-Assignment for Secure Wireless Sensor Networks

Find out which keys are shared and xor them together

An attacker needs to know all shared keys

Channel establishment

Page 15: Random Key-Assignment for Secure Wireless Sensor Networks

Corruption probability – P=1000

Page 16: Random Key-Assignment for Secure Wireless Sensor Networks
Page 17: Random Key-Assignment for Secure Wireless Sensor Networks

Corruption Probability – k=120

Page 18: Random Key-Assignment for Secure Wireless Sensor Networks

The cooperative protocol

Page 19: Random Key-Assignment for Secure Wireless Sensor Networks

Nearby sensors◦ Weaker against geographically attacks

Random◦ Larger communication overhead

Individual properties◦ More trusted nodes can give higher security

The C set

Page 20: Random Key-Assignment for Secure Wireless Sensor Networks

They give an upper bound on the probability that the channel between two nodes is corrupted, given w corrupted nodes

Upper bound

Page 21: Random Key-Assignment for Secure Wireless Sensor Networks

Sensor failure resistent◦ Can add more sensors if required

No information leakage◦ Sensors in the C set only transmits hash values of

their keys Adaptiveness

◦ If an upper bound of w is known, C can be chosen to secure communication with a desired probability.

Load balance◦ a sends c+1 message, sensors in C send 1,

tot=2c+1◦ Only done once during setup

Features of cooperation protocol

Page 22: Random Key-Assignment for Secure Wireless Sensor Networks

Sensor doesn’t respond◦ After timeout, node a can pick another node

Sensor sends correct key◦ Lowers security

Sends false key◦ Can pick another C set◦ Notify trusted base-station◦ Aware that network is under attack

DoS Attacks of Malicious Cooperators

Page 23: Random Key-Assignment for Secure Wireless Sensor Networks

If node a has the keys that node a should have, according to the pseudo-random number generator, it’s probable that a is a.

Authentication

Page 24: Random Key-Assignment for Secure Wireless Sensor Networks

P=1000 and w=8

Page 25: Random Key-Assignment for Secure Wireless Sensor Networks

P=1000 w=16

Page 26: Random Key-Assignment for Secure Wireless Sensor Networks

P=10000 w=32

Page 27: Random Key-Assignment for Secure Wireless Sensor Networks

M = {} for all keys k in P

◦ z = RND(id||k)◦ if(z%(|P|/m)==0)

put k into M

|M| must be less than memory size but larger than the security constraints

Discard ID if conditions not satisfied

Efficient and Secure Pre-deployment (ESP)

Page 28: Random Key-Assignment for Secure Wireless Sensor Networks

Generated IDs

Page 29: Random Key-Assignment for Secure Wireless Sensor Networks

Direct protocol