Top Banner
TinySec: A Link Layer Security TinySec: A Link Layer Security Architecture for Wireless Sensor Architecture for Wireless Sensor Networks Networks Seetha Manickam Seetha Manickam Modified by Sarjana Singh Modified by Sarjana Singh
28

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Feb 24, 2016

Download

Documents

hosea

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Seetha Manickam Modified by Sarjana Singh. Motivation TinySec-Introduction Sensor Networks Security threats and Need for link layer security architecture design Design goals Tiny sec Design - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

TinySec: A Link Layer Security Architecture TinySec: A Link Layer Security Architecture for Wireless Sensor Networksfor Wireless Sensor Networks

Seetha ManickamSeetha ManickamModified by Sarjana SinghModified by Sarjana Singh

Page 2: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

OverviewOverview

Motivation TinySec-Introduction Sensor Networks Security threats and Need

for link layer security architecture design Design goals Tiny sec Design Security Analysis of Tinysec Performance Evaluation of Tiny Sec Conclusion

Page 3: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

MotivationMotivation

• Sensor networks : Resource constraint networks – small memories, weak processors, limited energy.

• Conventional security protocols (802.11b , 802.15.4 are found to be insecure , adds lot of overhead (16-32 bytes) ).

• Need for a new security architecture for sensor networks –TINYSEC.

Page 4: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

TINYSEC TINYSEC

• Light weight and efficient generic link layer security package.

• Developers can easily integrate into sensor network applications.

• A research platform that is easily extensible and has been incorporated into higher level protocols.

Page 5: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Security threats in Sensor NetworksSecurity threats in Sensor Networks

• Use of wireless communications -In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject and alter transmitted data.

• Adversaries can Interact with networks from a distance by expensive radio transceivers and powerful workstations.

• Resource consumption attacks: Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.

• However , these threats are not addressed. Focus is on guaranteeing message authenticity, integrity and confidentiality.

Page 6: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Motivation for Link layer security in Motivation for Link layer security in Sensor NetworksSensor Networks

• End-End security Mechanisms : Suitable only for conventional networks using end-end communications where intermediate routers only need to view the message headers.

• BUT, in Sensor networks In-network processing is done to avoid redundant messages-Requires intermediate nodes to have access to whole message packets and just not the headers as in conventional networks.

..contd..

Page 7: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Motivation for Link layer security in Motivation for Link layer security in Sensor NetworksSensor Networks

• Why end-end security mechanisms not suitable for sensor networks?

• If message integrity checked only at the destination, the networks may route packets injected by an adversary many hops before they are detected. This will waste precious energy.

• A link layer security mechanism can detect unauthorized packets when they are first injected onto the network.

Page 8: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Design GoalsDesign Goals

• Security Goals• Performance Goals• Usability Goals

Page 9: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Security GoalsSecurity Goals

• A link layer security protocol should satisfy three basic security properties:

• Access control and Message integrity -prevent unauthorized parties from participating• Confidentiality - keeping information secret form unauthorized parties• Explicit omission: Replay protection -an adversary eavesdropping a legitimate message sent

between 2 authorized parties and replays it at a some time later

Page 10: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Performance goalsPerformance goals

• A system using cryptography will incur increased overhead in length of the message.

• Increased message length results- -decreased message throughput

-increased latency

-Increased Power Consumption( Sensor Networks )

Page 11: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Usability GoalsUsability Goals

• Security Platform- Higher level security protocols can use Tinysec to create secure pair wise communication between neighboring nodes.

• To reduce the effort, TinySec should provide proper interfaces

• Transparency- Should be transparent to the user• Portability- Should fit into the radio stack so that

porting the radio stack from one platform to another is easy.

Page 12: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Security PrimitivesSecurity Primitives

• Message Authentication code - A cryptographic checksum for checking

the message integrity• Initialization vector (IV) -A side input to the encryption algorithm. - Provides Semantic Security

Page 13: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

TINYSEC-DESIGNTINYSEC-DESIGN

Two Security Options 1.Authentication Encryption (Tinysec-AE) 2. Authentication only (Tinysec-Au)• Encryption : Specifying the IV format Selecting an encryption Scheme( CBC)

Page 14: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Tinysec IV formatTinysec IV format

• IV too long- add unnecessary bits to the packet

• Too short – Risk of repetition

• How long should be the IV? N bit IV repeat after 2^n +1. If we use a n bit counter repetitions will not happen before that point.

Page 15: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Encryption schemesEncryption schemes

• CBC is the most appropriate scheme for sensor networks –why?

• Works better with repeated IVs.• IVs can be pre encrypted for use since it is

proved that CBS mode is highly secure with non repeated IVS.

• One drawback- Message expansion • Use Cipher text stealing-Cipher text

length=plaintext length

Page 16: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

TinySec packet FormatTinySec packet Format

Page 17: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Security Analysis of TinySecSecurity Analysis of TinySecMessage Integrity and AuthenticityMessage Integrity and Authenticity

• Security of CBC-MAC is proportional to the length of the MAC.

• Is the choice of 4 byte MAC- less secure then? – NO!!!!! ..Not for sensor networks!

• Given 4 byte MAC- adversary should make at least 2^31 tries. Even if the adversary flood the channel, he can send only 40 forgery attempts/sec, sending 2^31 would take 20 months. Battery operated nodes do not have that much energy to collect all those packets.

Page 18: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Confidentiality analysis for TinysecConfidentiality analysis for Tinysec

• Combination of carefully formatted IVs , low data rates and CBC mode for encryption achieves high confidentiality in TinySec.

• The format of the last 4 bytes –maximizes the number of packets each node can send before there is a repetition of IV.

• For a network of n nodes, n.2^16 packets will be sent before the reuse of IV.

Page 19: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Keying MechanismsKeying Mechanisms

• Appropriate keying mechanism for a particular network depends on several factors.

• Tinysec key- A pair of skipjack key-one for authentication, one or encryption.

• Simplest keying mechanism: Use a single key for the entire network, Preload the key before deployment.-Adversary can compromise on node and get the key..

Page 20: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Keying mechanism –contd.Keying mechanism –contd.

• Use per-link keying, separate Tinysec key for each pair of node wishing to communicate. Drawback: Key distribution becomes a challenge.

• Allow a group of nodes to share a TinySec key rather than each pairs. Group keying provides an intermediate level of resilience.

Page 21: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Implementation of TinySecImplementation of TinySec

• Implemented on Berkeley sensor nodes.• Integrated into TOSSIM simulator.• 3000 lines of nesC code.• TinyOS 1.1.2 radio stack modified to

incorporate TinySec.• Level of protection can be included in

the data payload.

Page 22: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Performance Evaluation of TinySecPerformance Evaluation of TinySec

• Increases the computation costs and the energy cost of sending a packet, but these costs must be modest compared to the security that Tinysec provides.

Page 23: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Cipher PerformanceCipher Performance

Page 24: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Energy CostsEnergy Costs

Page 25: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

ThroughputThroughput

Page 26: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Performance summaryPerformance summary

• The energy, bandwidth and latency overhead –all are less than 10% by using Tinysec.

• Overhead-due to the increased packet size for cryptography.

• Tinysec is very competitive with other solutions.

• Tinysec has gathered a number of external users.

Page 27: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

ConclusionsConclusions

• We have learnt that there are design vulnerabilities in the conventional protocols for sensor networks.

• Conventional protocols tend to be conservative in their security guarantees, typically adding 16-32 bytes of overhead.

• Tinysec addresses these with extreme careful design and takes advantages of the limitations of sensor networks.

Page 28: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

ReferencesReferences

Source : http://www.ece.mtu.edu/ee/faculty/cchigan/EE5970-Seminar/TinySec.ppt