1 / 13

Sensor Network Security

Sensor Network Security. Presented by: Iftekhar Salam. Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza. 1. Link layer Security architecture for WSN. TinyPK – Public key cryptography based security primitive TinyECC - Public key cryptography based security primitive

Télécharger la présentation

Sensor Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sensor Network Security Presented by: Iftekhar Salam Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1

  2. Link layer Security architecture for WSN • TinyPK – Public key cryptography based security primitive • TinyECC - Public key cryptography based security primitive • SPINS – Symmetric key (Block Cipher) based security primitive • TinySec - Symmetric key (Block Cipher) based security primitive • Dragon MAC – Stream Cipher based security primitive • Rabbit MAC – Stream Cipher based security primitive

  3. SPINS: Security Protocol for Sensor Network [1] • Two secure building blocks • SENP + TESLA • Sensor-Network Encryption Protocol • RC-5 block cipher were used. • Provide data confidentiality, two party data authentication and data freshness • Micro Timed Efficient Stream Loss-tolerant Authentication • Provide authenticated broadcast • Secures point-to-point communication

  4. SPINS: Security Protocol for Sensor Network … • However, as pointed out by Menezes et. al. in [2], this is not a very good implementation; the randomness of the random number generator that is based on a block cipher may lead to unexpected security problem • Also available memory is one major problem.

  5. TinySec [3] • Two Security Options • Authentication Encryption (TinySec-AE) • Authentication only (TinySec-Au) – default mode • Encryption : Block cipher used • Skipjack • Achieves low energy consumption and memory usage • However, it can not provide protection against replay attacks

  6. TinyPK [4] • Software based implementation of public key cryptography protocol • TinyPK is based on RSA cryptosystem. • TinyPK requires a Certificate Authority. • Any external party that wishes to interact with the node also requires its own Public/private key • Based on the Diffie-Hellman key agreement protocol the authentication is done.

  7. TinyPK … Memory Size Execution Time • it requires relatively higher processing time for a single message • it consumes lot of energy and bandwidth for the setup of session key

  8. TinyECC [5] • Elliptic curve cryptography(ECC) • Based on the elliptic curve discrete logarithm problem • No sub exponential algorithm to solve it are known • Provide a digital signature scheme, a key agreement protocol and a public key encryption scheme. • Configurability is one unique feature of this TinyECC. • However, TinyECC needs to store a public key of 40 bytes for every sender, every receiver. It suffers from scalable problem [6].

  9. Dragon cipher • Lim et. al [7], proposed a Dragon-MAC secure data scheme, which is based on Dragon Stream Cipher. • Dragon-MAC: provide authenticated encryption, based on Dragon Stream cipher. • Dragon is Word based Algorithm. • Two variants • Dragon-128 • Dragon-256 • Dragon fast in software implementation. • Selected for European estream’s project.

  10. Rabbit cipher • Tahir et. al. proposed a lightweight authenticated encryption mechanism based on Rabbit stream cipher for wireless sensor network. • Generates a rabbit based MAC function to ensure data authentication and integrity

  11. Research Objectives • To implement the PingPong-128 at the link layer to ensure the security of wireless sensor network • PingPong-128 is a key generator which is based on the summation generator with a mutual clock control structure

  12. Reference 1. Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J.D. (2002) SPINS: security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002. 2. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, 5th ed., CRC Press, 1996. 3. Karlof, C., Shastry, N. and Wagner, D. (2004) Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA. 4. R. Watro, D Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology”, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004. 5. A Liu, P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks”, 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), April 2008, pp. 245-256.

  13. Reference 6. Z. Xin, W. Xiao-dong, “Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks”, International Journal of Advanced Science and Technology, vol. 2, January, 2009. 7. S. Y. Lim, C. C. Pu, H. T. Lim, H. J. Lee, “Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption”. 8. R. Tahir, M. Y. Javed, A. R. Cheema, “Rabbit-MAC: lightweight Authenticated Encryption in WSN”, international Conference on Information and Automation june 20-23, Zhangjiajia, China. IEEE2008. 9. H. J. Lee, K. Chen, “PingPong-128, A New Stream Cipher for Ubiquitous Application”, 2007 ICCIT, IEEE computer Society.

More Related