1 adaptive key pre-distribution model for distributed sensor networks author: c.-s. laih, m.-k. sun,...

19
1 Adaptive key pre- distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications, vol. 3, no. 5, pp.723-732, 2009. (Impact Factor = 0.751) Presenter: Yung-Chih Lu Date: 2010/08/20

Upload: mae-harris

Post on 20-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

1

Adaptive key pre-distribution model for distributed sensor networks

Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications, vol. 3, no. 5, pp.723-732, 2009. (Impact Factor = 0.751)Presenter: Yung-Chih LuDate: 2010/08/20

Page 2: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

2

Outline

Introduction Proposed Scheme Performance Evaluation Security Analysis Conclusion

Page 3: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

3

Introduction(1/3)

Distributed Sensor Network

Base station

location finding system

mobilizer

transceiver Unit

sensing unit processing unit

sensordigital/analogconverter

microprocessor

storage device

power unit

Powergeneration

Sensor Architecture

Page 4: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

4

Introduction(2/3)

key agreement protocol Key pre-distribution:

Keys are distributed to all sensor nodes prior to deployment.

Page 5: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

5

Introduction(3/3)

Constraints Limited energy consumption Low transmission range Limited Memory overhead

Requirements High network connectivity Robust resilience against node capture Low communication overhead

Page 6: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

6

Eschenauer-Gligor Scheme(1/3) Key pre-distribution phase

Key poolKeys

Key identifier

Key poolKeys

Key identifier

Key ring(k keys)

H-sensor

Key identifier = key mod 232

Kci = EKx(ci) Kx = K1 ,…, K⊕ ⊕ k

ci = H-Sensor ID

H-Sensor : L-Sensors ID 、 L-Sensors key identifiers and Kci

L-Sensor : k keys 、 key identifiers and Kci

:L-Sensor

L-Sensor : Low-end sensorH-Sensor : High-end sensor

L. Eschenauer and V. Gligor. “A Key-Management Schemefor Distributed Sensor Networks.” In Proc. 9th ACM Conference on Computerand Communication Security, pp.41-47, Nov. 2002.

Page 7: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

7

Eschenauer-Gligor Scheme(2/3) Shared-key discovery

Key ring(k keys)

H-sensor

:L-Sensor

Step1: Each L-sensor Broadcasts a list of key identities.

Step2: L-sensor runs a challenge-response protocol if L-sensor find the common key.

Eki(α)

Eki(α)

α = Dki[Eki(α)]

Page 8: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

8

Eschenauer-Gligor Scheme(3/3) Path-key establishment

Key ring(k keys)

H-sensor

:L-Sensor

Ekc(kp)

Ekc(kp)

Ekp(α)

α = Dkp[Ekp(α)]

Page 9: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

9

Proposed Scheme(1/5)

Shamir’s threshold scheme

PT: prime number PT ≧ a0

t : degree of polynomial a0 : group key

Example:

t=3 ; a0=1234 ; n = 6

g(x) = 94x2+166x+1234

(1,1494);(2,1942);(3,2578);

(4,3402);(5,4414);(6,5614)

g(x)

= 94x2+166x+1234

g(0) = 1234

Page 10: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

10

Proposed Scheme(2/5)

Key poolKey pool

S1S1

S2S2

SvSv

Sub-key pool

……

……

……

….

|S| :the number of keys in key pool v :the number of sub-key poolsGK: group key|d| = |S| / v

sk = sub-keyID = sub-key identifierskij = gi(IDij) i=1,2,…,v j=1,2,…,|d|

g1(x) GK1

g2(x) GK2

gv(x) GKv

Page 11: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

11

Proposed Scheme(3/5)

Key pre-distribution phase

Key ring

(τ keys and key ID)

S1S1

S2S2

SvSv

……

……

……

Sub-key pool

sensor

Page 12: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

12

Proposed Scheme(4/5)

Shared-key discovery phase

H-sensor

:L-Sensor

Step1: Each L-sensor Broadcasts a list of key ID.

Step2: L-sensor runs a challenge-response protocol if L-sensor find the communication key.

q’: the number of common keysEski(α)

Eski(α)

α = Dski[Eski(α)]

Page 13: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

13

Proposed Scheme(5/5)

Shared-key discovery phaseStep1 ︰ Each L-sensor computes their respective bonus key rings

Step2: Each L-sensor Broadcasts a list of group key ID.

Step3: L-sensor runs a challenge-response protocol if L-sensor find the communication key.

q’: the number of common keys

Key ring

(τ keys and key ID)

bonus key ring

(w group keys And group key ID)

Page 14: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

14

Performance Evaluation(1/4)

a. number of groups v = 30,size of the key pool |S| = 10000, size of key rings τ = 75

b.value of threshold t = 2, size of the key pool |S| = 1000, size of key rings τ = 40

Connectivity

Page 15: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

15

Performance Evaluation(2/4)

Local connectivity

Network connectivity

Page 16: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

16

Performance Evaluation(3/4)

Connectivity

Page 17: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

17

Performance Evaluation(4/4)

Communication overhead

a. EG scheme

b. Proposed scheme

Page 18: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

18

Security Analysis

Resilience against node capture

a. τ =40 and p =0.33

b.τ =40 and p =0.5

p: local connectivity

Page 19: 1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,

19

Conclusion

Dependent keys High connectivity It is able to adjust its system

parameters