self-healing group-wise key distribution schemes with time-limited node revocation for wireless...

11
Self-Healing Group-Wise Key Distribution Schemes with Time- Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang, Chuang Lin CMSC 681 Fall 2007 Advanced Computer Networks Isaac Mativo

Upload: lucas-barrett

Post on 17-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks

Minghui Shi, Xuemin Shen, Yixin Jiang, Chuang Lin

CMSC 681 Fall 2007Advanced Computer Networks

Isaac Mativo

Page 2: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Sensor Node Typical sensor node contains

Power unit Sensing unit Processing unit Storage unit Wireless transceiver

Wireless Sensor Node may be able to monitor several parameters by combining several kinds of sensor nodes

Page 3: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Wireless Sensor network

Architecture of a wireless sensor network

Data processing and management center

Internet/satellite

Base Station

Sensor field

Page 4: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Motivation Important to prevent unauthorized nodes to

access some information Traffic encryption key (TEK) is used to encrypt

data at source and decrypt at destination TEK refreshed continuously by the group key

manager (GKM) This process may degrade performance and

scalability Authors propose two schemes which ensures

secrecy, certain collusion freedom, and group confidentiality.

Algorithm based on the dual direction hush chain (DDHC) and hash binary tree (HBT)

Page 5: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Important Issues Key management

in WSN Resilience against

node capture Resilience against

node replication Node revocation

or participation Scalability – as

network grows

Group-wise key distribution schemes Group

confidentiality Forward secrecy Backward secrecy Collusion freedom

Page 6: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

DDHC DDHC is composed of two one-way hash

chains Forward hash chain Backward hash chain

Page 7: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Limited Time Node Revocation y = Hash(x): Should be easy to compute

y given x, but computationally infeasible to compute x such that y = Hash(x)

Page 8: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Hash Binary Tree

Page 9: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

How the Schemes Work DDHC

Group key manager (GKM) selects a secret seed to generate the one-way hash chain

The rekeying message is broadcast within the sensor network from time to time

Each legitimate node within the group is able to compute the traffic encryption key (TEK) to encrypt and decrypt the multicast messages

Time-limited node revocation scheme: TEK = f(Nf, Nb, RK)

Each node has a small storage buffer that enables it to perform self-healing recovery of a rekeying message.

Lost RK can be recovered using the one-way hash function and the last received RK

HBT Also based on hash functions To improve security, the HBT is

adopted to generate all pre-assigned seeds.

GKM assigns the seeds, which include the sub-root nodes that are then used to compute the leaf nodes

Each TEK is linked to a leaf node, and all leaf nodes are derived using a hash algorithm on these seeds.

Time-limited node revocation mechanism: TEK = f(S(D, t), RK)

Lost RK can be recovered using the one-way hash function and the last received RK

Page 10: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Conclusion

Scheme provides: Low storage overhead Low Communication overhead

(broadcast and unicast) Low to medium implementation

complexity Implicit authentication Tolerance for lost rekeying messages Forward and backward secrecy

Page 11: Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,

Questions?

The End