an efficient scheme for authenticating public keys in sensor networks

28
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina State)

Upload: jacie

Post on 11-Feb-2016

23 views

Category:

Documents


0 download

DESCRIPTION

An Efficient Scheme for Authenticating Public Keys in Sensor Networks . Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina State). Sensors. Deploy. Wireless Sensor Networks. Sensors. Deploy. Key Distribution in WSN. Secure Channels. Existing Approaches. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

An Efficient Scheme for Authenticating Public Keys

in Sensor Networks

Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse)

Peng Ning (North Carolina State)

Page 2: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Wireless Sensor Networks

DeploySensors

Page 3: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Key Distribution in WSN

DeploySensors

Secure Channels

Page 4: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Existing Approaches Key Pre-distribution Schemes

Eschenauer and Gligor, CCS’02 Chan, Perrig, and Song, S&P’03 Du, Deng, Han, and Varshney, CCS’03 Du, Deng, Han, Chen, Varshney, INFOCOM’04 Liu and Ning, CCS’03

Assumption Public Keys are impractical for WSN We need to use Symmetric Keys

Page 5: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Three Years Later Has Public-Key Cryptography (PKC) became

practical yet? The answer might still be NO, but …

Recent Studies on using PKC on sensors PKC is feasible for WSN ECC signature verification takes 1.6s on

Crossbow motes (Gura et al.)

Page 6: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

The Advantage of PKC Resilience versus Connectivity

SKC-based schemes have to make tradeoffs between resilience and connectivity

PKC-based Key Distribution 100% resilience 100% connectivity

Page 7: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Let’s Switch to PKC? Sorry, I forgot to mention one thing:

The gap between SKC and PKC is not going to change much unless a breakthrough in PKC occurs.

Computation costs RC5 is 200 times faster than ECC

Communication costs Signatures: ECC (320 bits), RSA (1024 bits),

SHA1 (160 bits)

Page 8: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

New Focuses My observation:

We will be able to use PKC, but we will use SKC if that can save energy.

We are doing this in traditional networks Example: session keys

Research Problem Can we reduce the amount of PKC computations with the help of SKC?

Page 9: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Public Key Authentication Before a public key is used, it must to

authenticated In traditional networks: we use certificates.

Verifying certificates is a public key operation

Can we do it more efficiently in WSN? A simple way: each node carries the hash of

other nodes’ public keys Memory usage is too much (N-1 hash values)

Page 10: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Using Merkle Trees

Page 11: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Performance Memory Usage

1 + log(N) hash values (compared to N-1) 1: the root Log(N): the height of the Merkle tree

Computation Cost Log(N) hash operations

Communication Overhead If we use 160-bit SHA1 160 * log(N) bits When N=10,000, cost=2080 bits, worse than PKC We need to reduce the height

Page 12: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Trimming the Merkle Tree

Page 13: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

A Smarter Trimming

A B

C

Page 14: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Deployment Knowledge How do we know that some nodes might

more likely be neighbors than others? Deployment knowledge model.

Page 15: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

A Group-Based Deployment Scheme

Page 16: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

A Group-Based Deployment Scheme

Page 17: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Modeling of The Group-Based Deployment Scheme

Deployment Points

Page 18: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Trimming Strategy

Page 19: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Deployment-based Trimming

Page 20: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Finding Optimal a,b,c, and d The optimization problem:

S: number of sensors in each deployment group mmax: maximum amount of memory

Minimize C = w0• a + w1• b + w2• c + w3• d

Subject to

Page 21: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Evaluation

Page 22: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Communication Overhead vs. Memory Usages

Page 23: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Communication Overhead vs. Network Size

Page 24: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Impact of Deployment Knowledge: σ

Page 25: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Impact of Modeling Accuracy

Page 26: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Energy consumption

Page 27: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Comparing Energy cost with RSA / ECC

Performance of authenticating public keys using various algorithms

Page 28: An Efficient Scheme for Authenticating Public Keys  in Sensor Networks

Conclusion and Future Work Public Key Cryptography (PKC)

Will soon be available for sensor networks Usage of PKC should still be minimized We propose an efficient scheme to achieve public

key authentication. Future work

Optimize other PKC computations