sensor network security
Post on 15-Mar-2016
29 Views
Preview:
DESCRIPTION
TRANSCRIPT
SENSOR NETWORK SECURITY
Group MembersPardeep KumarMd. Iftekhar SalamAhmed Galib Reza
1
Presented by: Iftekhar Salam
1
Link layer Security architecture for WSN
TinyPK – Public key cryptography based security primitive TinyECC - Public key cryptography based security primitive SPINS – Symmetric key (Block Cipher) based security
primitive TinySec - Symmetric key (Block Cipher) based security
primitive Dragon MAC – Stream Cipher based security primitive Rabbit MAC – Stream Cipher based security primitive
2
SPINS: Security Protocol for Sensor Network [1]
Two secure building blocks SENP + TESLA Sensor-Network Encryption Protocol
RC-5 block cipher were used. Provide data confidentiality, two party data authentication and data
freshness Micro Timed Efficient Stream Loss-tolerant Authentication
Provide authenticated broadcast Secures point-to-point communication
3
SPINS: Security Protocol for Sensor Network …
However, as pointed out by Menezes et. al. in [2], this is not a very good implementation; the randomness of the random number generator that is based on a block cipher may lead to unexpected security problem
Also available memory is one major problem.
SPINSEncryption Yes – CTR
modeBlock Cipher RC5Freshness YesCode requirement
2674 Bytes maximum
Authentication Yes – CBC MACTime 7.2ms
4
TinySec [3]
Two Security Options Authentication Encryption (TinySec-AE) Authentication only (TinySec-Au) – default mode
Encryption : Block cipher used Skipjack
Achieves low energy consumption and memory usage However, it can not provide protection against replay attacks
TinySecEncryption Optional – CBC modeBlock Cipher SkipjackFreshness NoCode Requirement 7146 Bytes maximumAuthentication Yes – CBC MACKey Agreement Any
5
TinyPK [4]
Software based implementation of public key cryptography protocol
TinyPK is based on RSA cryptosystem. TinyPK requires a Certificate Authority. Any external party that wishes to interact with the node
also requires its own Public/private key Based on the Diffie-Hellman key agreement protocol
the authentication is done.
6
TinyPK …
it requires relatively higher processing time for a single message it consumes lot of energy and bandwidth for the setup of session key
Memory Size Execution Time
7
TinyECC [5]
Elliptic curve cryptography(ECC) Based on the elliptic curve discrete logarithm problem No sub exponential algorithm to solve it are known Provide a digital signature scheme, a key agreement
protocol and a public key encryption scheme. Configurability is one unique feature of this TinyECC. However, TinyECC needs to store a public key of 40
bytes for every sender, every receiver. It suffers from scalable problem [6].
8
Dragon cipher
Lim et. al [7], proposed a Dragon-MAC secure data scheme, which is based on Dragon Stream Cipher.
Dragon-MAC: provide authenticated encryption, based on Dragon Stream cipher.
Dragon is Word based Algorithm. Two variants
Dragon-128 Dragon-256
Dragon fast in software implementation. Selected for European estream’s project.
9
Rabbit cipher
Tahir et. al. proposed a lightweight authenticated encryption mechanism based on Rabbit stream cipher for wireless sensor network.
Generates a rabbit based MAC function to ensure data authentication and integrity
10
Research Objectives
To implement the PingPong-128 at the link layer to ensure the security of wireless sensor network
PingPong-128 is a key generator which is based on the summation generator with a mutual clock control structure
11
Reference12
1. Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J.D. (2002) SPINS: security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002.
2. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, 5th ed., CRC Press, 1996.
3. Karlof, C., Shastry, N. and Wagner, D. (2004) Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA.
4. R. Watro, D Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology”, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004.
5. A Liu, P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks”, 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), April 2008, pp. 245-256.
Reference13
6. Z. Xin, W. Xiao-dong, “Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks”, International Journal of Advanced Science and Technology, vol. 2, January, 2009.
7. S. Y. Lim, C. C. Pu, H. T. Lim, H. J. Lee, “Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption”.
8. R. Tahir, M. Y. Javed, A. R. Cheema, “Rabbit-MAC: lightweight Authenticated Encryption in WSN”, international Conference on Information and Automation june 20-23, Zhangjiajia, China. IEEE2008.
9. H. J. Lee, K. Chen, “PingPong-128, A New Stream Cipher for Ubiquitous Application”, 2007 ICCIT, IEEE computer Society.
top related