sensor network security

13
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1

Upload: david-manning

Post on 15-Mar-2016

29 views

Category:

Documents


0 download

DESCRIPTION

Sensor Network Security. Presented by: Iftekhar Salam. Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza. 1. Link layer Security architecture for WSN. TinyPK – Public key cryptography based security primitive TinyECC - Public key cryptography based security primitive - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Sensor Network Security

SENSOR NETWORK SECURITY

Group MembersPardeep KumarMd. Iftekhar SalamAhmed Galib Reza

1

Presented by: Iftekhar Salam

1

Page 2: Sensor Network Security

Link layer Security architecture for WSN

TinyPK – Public key cryptography based security primitive TinyECC - Public key cryptography based security primitive SPINS – Symmetric key (Block Cipher) based security

primitive TinySec - Symmetric key (Block Cipher) based security

primitive Dragon MAC – Stream Cipher based security primitive Rabbit MAC – Stream Cipher based security primitive

2

Page 3: Sensor Network Security

SPINS: Security Protocol for Sensor Network [1]

Two secure building blocks SENP + TESLA Sensor-Network Encryption Protocol

RC-5 block cipher were used. Provide data confidentiality, two party data authentication and data

freshness Micro Timed Efficient Stream Loss-tolerant Authentication

Provide authenticated broadcast Secures point-to-point communication

3

Page 4: Sensor Network Security

SPINS: Security Protocol for Sensor Network …

However, as pointed out by Menezes et. al. in [2], this is not a very good implementation; the randomness of the random number generator that is based on a block cipher may lead to unexpected security problem

Also available memory is one major problem.

SPINSEncryption Yes – CTR

modeBlock Cipher RC5Freshness YesCode requirement

2674 Bytes maximum

Authentication Yes – CBC MACTime 7.2ms

4

Page 5: Sensor Network Security

TinySec [3]

Two Security Options Authentication Encryption (TinySec-AE) Authentication only (TinySec-Au) – default mode

Encryption : Block cipher used Skipjack

Achieves low energy consumption and memory usage However, it can not provide protection against replay attacks

TinySecEncryption Optional – CBC modeBlock Cipher SkipjackFreshness NoCode Requirement 7146 Bytes maximumAuthentication Yes – CBC MACKey Agreement Any

5

Page 6: Sensor Network Security

TinyPK [4]

Software based implementation of public key cryptography protocol

TinyPK is based on RSA cryptosystem. TinyPK requires a Certificate Authority. Any external party that wishes to interact with the node

also requires its own Public/private key Based on the Diffie-Hellman key agreement protocol

the authentication is done.

6

Page 7: Sensor Network Security

TinyPK …

it requires relatively higher processing time for a single message it consumes lot of energy and bandwidth for the setup of session key

Memory Size Execution Time

7

Page 8: Sensor Network Security

TinyECC [5]

Elliptic curve cryptography(ECC) Based on the elliptic curve discrete logarithm problem No sub exponential algorithm to solve it are known Provide a digital signature scheme, a key agreement

protocol and a public key encryption scheme. Configurability is one unique feature of this TinyECC. However, TinyECC needs to store a public key of 40

bytes for every sender, every receiver. It suffers from scalable problem [6].

8

Page 9: Sensor Network Security

Dragon cipher

Lim et. al [7], proposed a Dragon-MAC secure data scheme, which is based on Dragon Stream Cipher.

Dragon-MAC: provide authenticated encryption, based on Dragon Stream cipher.

Dragon is Word based Algorithm. Two variants

Dragon-128 Dragon-256

Dragon fast in software implementation. Selected for European estream’s project.

9

Page 10: Sensor Network Security

Rabbit cipher

Tahir et. al. proposed a lightweight authenticated encryption mechanism based on Rabbit stream cipher for wireless sensor network.

Generates a rabbit based MAC function to ensure data authentication and integrity

10

Page 11: Sensor Network Security

Research Objectives

To implement the PingPong-128 at the link layer to ensure the security of wireless sensor network

PingPong-128 is a key generator which is based on the summation generator with a mutual clock control structure

11

Page 12: Sensor Network Security

Reference12

1. Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J.D. (2002) SPINS: security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002.

2. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, 5th ed., CRC Press, 1996.

3. Karlof, C., Shastry, N. and Wagner, D. (2004) Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA.

4. R. Watro, D Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology”, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004.

5. A Liu, P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks”, 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), April 2008, pp. 245-256.

Page 13: Sensor Network Security

Reference13

6. Z. Xin, W. Xiao-dong, “Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks”, International Journal of Advanced Science and Technology, vol. 2, January, 2009.

7. S. Y. Lim, C. C. Pu, H. T. Lim, H. J. Lee, “Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption”.

8. R. Tahir, M. Y. Javed, A. R. Cheema, “Rabbit-MAC: lightweight Authenticated Encryption in WSN”, international Conference on Information and Automation june 20-23, Zhangjiajia, China. IEEE2008.

9. H. J. Lee, K. Chen, “PingPong-128, A New Stream Cipher for Ubiquitous Application”, 2007 ICCIT, IEEE computer Society.