Wireless Network Security Spring 2014
|
|
|
- Phillip O’Neal’
- 10 years ago
- Views:
Transcription
1 Wireless Network Security Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1
2 Announcements 2
3 Broadcast Communication Wireless networks can leverage the broadcast advantage property to send a message to multiple recipients simultaneously In a star (like a WiFi network), O(1) transmissions cover all N recipients In general, O(N/d) transmissions cover N recipients with density d, using relaying
4 Broadcast Security To leverage broadcast advantage All recipients need to be able to authenticate the transmitter / message from the single transmission All recipients need to be able to decrypt the message from the single transmission Also, the authentication, en/decryption, and key management mechanisms need to be efficient
5 Broadcast Authentication Sender wants to broadcast a single message in a wireless network To protect against packet injection and other threats, need to verify the data origin Alice M Sender M Dave M Bob M Carol
6 Broadcast Auth Mechanisms 1. Symmetric key crypto and message auth codes (MACs) Sender w/ key K M, MAC K (M) M, MAC K (M) Alice w/ key K M', MAC K (M') Bob w/ key K Some form of asymmetry is required
7 Broadcast Auth Mechanisms 2. Public-key signatures Sender uses a private key to sign the message, all recipients verify with the corresponding public key Sender, K M, Sig K (M) M, Sig K (M) Ex: RSA 1024 bit signatures Alice, K -1 Bob, K -1 High generation cost (~10 milliseconds) High verification M', Sig cost K (M') (~1 millisecond) High communication cost (128 bytes/packet) Even more costly 2014 for Patrick low-end Tague processors
8 Broadcast Auth Mechanisms 3. Packet-block signatures Sign a collection of packets, partition signature over packet block disperse the cost of signing over larger chunks of data Sender, K M = {M i : i=1,...,k}, Sig K (M) s 1 s k M i, s i Alice, K -1 Verify Sig K ({M i }) {s i } More efficient, but loss of 1 block no verification
9 TESLA TESLA = Timed Efficient Stream Loss-tolerant Authentication [Perrig et al., RSA Cryptobytes 2002] Uses only symmetric cryptography Asymmetry via time Only the correct sender could compute MAC at time t Delayed key disclosure for verification Requires loose time synchronization
10 Delayed Key Disclosure F: public one-way function 1: Verify K F(K) Authentic Commitment P MAC K (P) 2: Verify MAC K disclosed 3: P Authentic! t
11 One-Way Hash Chains Versatile cryptographic primitive Pick random r N and public one-way function F For i=n-1,...,0 : r i = F(r i+1 ), then publish r 0 r 3 F r 4 F r 5 F r F 6 r 7 Properties Use in reverse order of construction: r 1, r 2,, r N Infeasible to derive r i from r j (j<i) Efficiently authenticate r i using r j (j<i): r j = F i-j (r i ) Robust to missing values
12 TESLA Schedules Keys disclosed 2 time intervals after use Receiver setup: Authentic K3, key disclosure schedule K3 F K4 F F F K5 K6 K7 Time 3 Time 4 Time 5 Time 6 Time 7 t P1, MAC K5 (P1), K3 P2, MAC K7 (P2), K5
13 Robustness to Packet Loss K3 F K4 F F F K5 K6 K7 Time 3 Time 4 Time 5 Time 6 Time 7 t P1, MAC K4 (P1), K2 P2, MAC K4 (P2), K2 P3, MAC K5 (P3), P4, MAC K3 K6 (P4), P5, K4 MAC K7 (P5), K5
14 Asymmetric Properties Disclosed value of key chain is a public key, it allows authentication of subsequent messages (assuming time synchronization) Receivers can only verify, not generate With trusted time stamping entity, TESLA can provide signature property
15 TESLA Summary Low overhead Communication (~ 20 bytes) Computation (~ 1 MAC computation per packet) Perfect robustness to packet loss Independent of number of receivers Delayed authentication Applications Authentic media broadcast Sensor networks Secure routing protocols
16 What about highly-constrained nodes in wireless sensor networks?
17 µtesla for WSN Proposed as part of the SPINS architecture [Perrig et al., WiNet 2002] Reduced communication compared to TESLA, key disclosure per epoch instead of per packet Includes several other optimizations for minimum overhead, practical in severely-constrained devices
18 SNEP for WSN SPINS also includes the Secure Network Encryption Protocol (SNEP) to provide data confidentiality, authentication, and freshness [Perrig et al., WiNet 2002] SNEP includes efficient key generation SNEP authenticated + encrypted packet structure: Data encrypted with shared key + counter (for semantic security) MAC over encrypted data Optional nonce-exchange for provable freshness
19 TinySec The TinySec architecture provides a practical security suite for wireless sensor networks [Karlof et al., SenSys 2004] TinySec-Auth provides authentication only TinySec-AE provides authenticated encryption Extensive discussion of design trade-offs and simulation results included in the paper
20 Further Reading Broadcast authentication in VANETs Studer et al., ESCAR 2008 / JCN Raya et al., SASN More in WSN Ren et al., WASA DoS-resilient broadcast authentication Gunter et al., NDSS Karlof et al., NDSS 2004.
21 In addition to security and performance features of the security protocols, what about the underlying key management?
22 Key Management How to add a member to the group without giving them access to past group activities? How to remove/revoke a member from the group without giving them access to future group activities? How to provide fresh credentials to group members?
23 Group Key Management Group formation, joining, and leaving can be controlled entirely by distribution and revocation of keys A session encryption key (SEK) is given to all group members (used to distribute/collect data) Key encryption keys (KEK) given to group members are used to periodically update SEKs Revocation = not getting an SEK update KEKs may also need to be updated Updating key must be very efficient so it can occur often enough to minimize effects of misbehavior
24 Challenges Simple attack models such as eavesdropping, message injection / tampering, masquerading, etc. can affect the entire security architecture Unicast solutions may be infeasible / impractical Network and services are dynamic, need to scale Various types of overhead to manage Initial trust relationship
25 Scale & Dynamics Depending on the scenario, the group size could be 10s, 100s, 1000s, s, Group membership and service subscription can be dynamic Can change on the order of seconds, minutes, days, months, Join and leave are random Most likely, there's no one size fits all method
26 Logical Key Hierarchy LKH arranges group members in an m-ary tree Tree leaves correspond to members with unique KEKs Internal tree nodes represent group KEKs Tree root represents the SEK Each member gets SEK and KEKs along tree path K 0 K 1,0 K 1,1 K 2,0 K 2,1 K 2,2 K 2,3 M 0 M 1 M 2 M 3
27 LHK Addition If M 34 wants to join a group and the tree isn't full full Give Start Kanother 0, K 1,1, Klevel 2,3 to of M the tree 3 K 0 K 1,0 K 1,1 K 2,0 K 2,1 K 2,2 K 2,3 K 2,3 M 0 M 1 M 2 M 3 M 3 K 3,0 K 3,1 M 0 M 4
28 LHK Removal If M 3 wants to leave the group, update SEK/KEKs {K' 0, K' }K 1,1 2,2 {K' }K 0 1,0 K' K 0 K 1,0 K 1,1 K' 1,1 K 2,0 K 2,3 K 2,1 K 2,2 M 0 M 1 M M 2 3
29 Storage: LKH Overhead Authority holds O(N) total keys Each member holds 1 SEK + O(log m (N)) KEKs Communication: Broadcast flood required for every update message, O(log m (N)) msg/removal Note: every msg may require multiple transmissions... Computation: Symmetric en/decryption operations
30 Generalized Key Graphs Key graphs generalize key trees for secure group communication [Wong et al., TR 1997] The authors propose a graph generalization of LKH allowing users to belong to groups arbitrarily instead of using a tree structure
31 Further Generalization Iolus: scalable multicast grouping using more generalized hierarchy [Mittra, SIGCOMM 1997] Distribution tree composed of smaller multicast subgroups in a hierarchy A group security intermediary (GSI) in each subgroup manages inter-subgroup details A group security controller (GSC) manages top-level subgroup and GSIs Further techniques for update, join, leave, etc.
32 Iolus Framework
33 How do these update procedures translate to the wireless domain?
34 Metrics Previous techniques described focus on number of update messages to broadcast What about the physical topology of the network? Relaying messages over multiple wireless links? Energy expenditure of long/lossy links? Broadcast advantage?
35 Power-Efficient Key Trees [Lazos & Poovendran, 2005] Key updates in large wireless networks (WSNs, MANETs, etc.) should be energy-efficient
36 But, in all these approaches, there's a catch...
37 Initial Key Agreement All of these key management approaches assume the new user is a valid user that can establish a pairwise KEK with the server Valid user authentication keys So, initial key agreement requires pre-existing keys or a secure offline initialization Protocols such as Diffie-Hellman and their many variants can help here, as long as they're practical for the context Human-in-the-loop allows for different approaches, e.g., SafeSlinger [Farb et al., 2013]
38 Key Agreement in WSN In challenged systems (WSN), key agreement is often to expensive Option: authority assigns symmetric keys (KEK, etc.) prior to deployment, nodes that share SEKs/KEKs after deployment can bootstrap secure links See [Eschenauer & Gligor, CCS 2002; Tague & Poovendran, ToSN 2007]
39 This pre-distribution has its own class of associated threats/attacks I can provide hundreds of papers if you're interested in learning more
40 February 11-13: Project Survey Presentations February 18: Project Proposals
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Security in Sensor Networks: Industry Trends, Present and Future Research Directions. Sensor Networks are Here!
Security in Sensor Networks: Industry Trends, Present and Future Research Directions Adrian Perrig [email protected] Sensor Networks are Here! Prototype sensor network deployments Burglar alarm in museum
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
How To Secure A Wireless Sensor Network
Int. J. Advanced Networking and Applications 707 Analysis of Security Protocols in Wireless Sensor Network Ritu Sharma 1 Email: [email protected] Yogesh Chaba 2 Associate Professor Email : [email protected]
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks Ioannis Krontiris Athens Information Technology P.O.Box 68, 19.5 km Markopoulo Ave. GR- 19002, Peania, Athens, Greece
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS Chang N. Zhang and Qian Yu Department of Computer Science, University of Regina 3737 Wascana Parkway, Regina, SK S4S 0A2 Canada {zhang, yu209}@cs.uregina.ca
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu Peng Ning Department of Computer Science North Carolina State University Raleigh,
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Security Solutions for Wireless Sensor Networks
Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium
How To Secure A Wireless Sensor Network
JOURNAL OF NETWORKS, VOL. 3, NO. 1, JANUARY 2008 65 Securing Wireless Sensor Networks: Security Architectures David Boyle Department of Electronic and Computer Engineering, University of Limerick, Limerick,
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Tema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Foundation University, Islamabad, Pakistan [email protected]
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan [email protected] ABSTRACT We proposed an authentication mechanism in the wireless sensor
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Fast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks
152 JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 2010 Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks Hany Samuel and Weihua Zhuang
Improving Availability of Secure Wireless Sensor Networks
SETIT 2007 4 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 25-29, 2007 TUNISIA Improving Availability of Secure Wireless Sensor Networks
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Wireless sensor network
SECURITY IN WIRELESS SENSOR NETWORKS By ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service,
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Chapter 17 Wireless Sensor Network Security: A Survey
Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. - c 2006 Auerbach Publications, CRC Press Chapter 17 Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS
A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS KUTHADI VENU MADHAV 1, RAJENDRA.C 2 AND RAJA LAKSHMI SELVARAJ 3 1 University of Johannesburg South Africa, 2 Audisankaara College of Engineering
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
SiRiUS: Securing Remote Untrusted Storage
SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University Introduction Secure network file systems not widespread. Why? 1. Hard
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Neighborhood-Based Security Protocol for Wireless Sensor Networks
The 6th International Conference on Information Technology and pplications (ICIT 2009) Neighborhood-Based Security Protocol for Wireless Sensor Networks Di Zhang, Ung Heo, Yi Zhao, Kang Soo You* and Jaeho
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
JOURNAL PAPER, ACCEPTED 1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE Abstract
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks
Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks Jing Deng Richard Han Shivakant Mishra Department of Computer Science University of Colorado Boulder, Colorado, USA [email protected],
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks
Acta Polytechnica Hungarica Vol. 8, No. 6, 2011 Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks Liana Khamis Qabajeh, Miss Laiha Mat Kiah Faculty of Computer Science and Information
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
Wireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
A Flexible Approach to Embedded Network Multicast Authentication
A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University [email protected] Philip Koopman ECE Department Carnegie Mellon University [email protected]
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS
K Y B E R N E T I K A V O L U M E 4 4 ( 2 0 0 8 ), N U M B E R 4, P A G E S 5 2 2 5 3 3 A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS Qian Fang, Ying Liu and Xiaoqun Zhao Security
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Enhancing Base Station Security in Wireless Sensor Networks
Enhancing Base Station Security in Wireless Sensor Networks Jing Deng, Richard Han, and Shivakant Mishra [email protected], {rhan,mishras}@cs.colorado.edu Technical Report CU-CS-951-3 April 23 University
Power Proximity Based Key Management for Secure Multicast in Ad Hoc Networks
Power Proximity Based Key Management for Secure Multicast in Ad Hoc Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
