End-to-end Secure Data Aggregation in Wireless Sensor Networks



Similar documents
Security Solutions for Wireless Sensor Networks

Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

How To Secure Data Aggregation In A Wireless Sensor Network

Wireless Sensor Networks Chapter 14: Security in WSNs

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Securing MANET Using Diffie Hellman Digital Signature Scheme

A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES

Secure Large-Scale Bingo

Access Control of Cloud Service Based on UCON

A Fully Homomorphic Encryption Implementation on Cloud Computing

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

Role Based Encryption with Efficient Access Control in Cloud Storage

Secure Aggregation in Hybrid Mesh/Sensor Networks

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Fundamentals of Mobile and Pervasive Computing

A Security Architecture for. Wireless Sensor Networks Environmental

Security Sensor Network. Biswajit panja

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Introduction to Wireless Sensor Network Security

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

An Overview of Common Adversary Models

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Content of smart wireless sensor network security and its network security policy

Foundation University, Islamabad, Pakistan

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Wireless Sensor Network: Challenges, Issues and Research

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

A Catechistic Method for Traffic Pattern Discovery in MANET

Depiction of Body Area Network in Cloud Environment

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

Paillier Threshold Encryption Toolbox

New System Security Model for a Mobile Operator s Meshed Access Network

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Security System in Cloud Computing for Medical Data Usage

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

3/25/ /25/2014 Sensor Network Security (Simon S. Lam) 1

Efficient Data Transmission For Wireless Sensor Networks

A Practical Security Framework for Cloud Storage and Computation

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Wireless sensor network

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Evaluating The Performance of Symmetric Encryption Algorithms

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3

Data Grid Privacy and Secure Storage Service in Cloud Computing

Mobile and Sensor Systems

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

About the Authors Preface Acknowledgements List of Acronyms

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Security and Privacy in Big Data, Blessing or Curse?

Research Projects in the Mobile Computing and Networking (MCN) Lab

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Lecture 6 - Cryptography

GSM and UMTS security

Experimental Analysis of Privacy-Preserving Statistics Computation

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Some Security Trends over Wireless Sensor Networks

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

The Disadvantages of Free MIX Routes and How to Overcome Them

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

A Proxy-Based Data Security Solution in Mobile Cloud

SPINS: Security Protocols for Sensor Networks

Transcription:

End-to-end Secure Data Aggregation in Wireless Sensor Networks Keyur Parmar 1 Devesh Jinwala 2 1 Ph.D Scholar & Senior Research Fellow Department of Computer Engineering SVNIT, Surat, India 2 Professor Department of Computer Engineering SVNIT, Surat, India December 18, 2014 Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 1/34

Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 2/34

Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 3/34

Introduction Wireless Sensor Nodes Equipped with Sensing and Actuation Capability Self-organizing Self-healing Highly Constrained Resources Processor Bandwidth Memory and Storage Space Communication and Computation Power Sensor Node = Sensing + Processing + Communication Akyildiz et al. Wireless Sensor Networks: A Survey. Computer Networks, Elsevier, 38(4), 393422, (2002). Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 4/34

In-network Processing (Data Aggregation) Reduces Data Transmission Improves Energy Efficiency Fasolo et al. In-network Aggregation Techniques for Wireless Sensor Networks: A Survey. Wireless Communications, IEEE 14(2), 70-87, (2007). Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 5/34

Secure Data Aggregation Types of Secure Data Aggregation Hop-by-Hop Secure Data Aggregation End-to-End Secure Data Aggregation (CDA) Ozdemir et al. Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview. Computer Networks, 53(12), 2022 2037, (2009). Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 6/34

Concealed Data Aggregation Security Requirements Integrity/Message Authentication Confidentiality/Privacy Replay Protection Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 7/34

Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 8/34

Privacy Homomorphism Homomorphic Primitives Homomorphic Encryption Homomorphic Message Authentication Codes Rivest et al. On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation 4(11), 169 180, (1978) Agrawal, S. et al. Homomorphic MACs: MAC-based Integrity for Network Coding. In: Proceedings of the 7th ACNS, pp. 292 305. Springer, Berlin, Heidelberg, (2009). Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 9/34

Privacy Homomorphism - Example Castelluccia et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 20:1-20:36, 2009. Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 10/34

Privacy Homomorphism - Example Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 11/34

Privacy Homomorphism - Example Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 12/34

Privacy Homomorphism - Example Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 13/34

Privacy Homomorphism - Example Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 14/34

Privacy Homomorphism - Example Castelluccia et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 20:1-20:36, 2009. Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 15/34

Privacy Homomorphism - Tradeoffs Malleability Non-Malleability Security Level Non-Malleability Adaptive Chosen Ciphertext Attack Malleability Chosen Ciphertext attack Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 16/34

Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 17/34

MR-CDA - Example Node 1 computes, C 1 = E BS (M 1 ) T 1 = MAC(C 1 ) E 1,3 (T 1 ) E 1,5 (T 1 ) Node 1 transmits, 1 3 C 1 E 1,3 (T 1 ) E 1,5 (T 1 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 18/34

MR-CDA - Example Node 2 computes, C 2 = E BS (M 2 ) T 2 = MAC(C 2 ) E 2,3 (T 2 ) E 2,5 (T 2 ) Node 2 transmits, 2 3 C 2 E 2,3 (T 2 ) E 2,5 (T 2 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 19/34

MR-CDA - Example 1 Node 3 decrypts, T 1 = D 1,3 (T 1 ) 2 Node 3 generates, T 1 = MAC(C 1) 3 Node 3 compares, T 1 = T 1? 4 Node 3 decrypts, T 2 = D 2,3 (T 2 ) 5 Node 3 generates, T 2 = MAC(C 2) 6 Node 3 compares, T 2 = T 2? Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 20/34

MR-CDA - Example Node 3 computes, C 3 = C 1 C 2 T 3 = T 1 T 2 E 3,5 (T 3 ) E 3,7 (T 3 ) Node 3 transmits, 3 5 C 3 E 3,5 (T 3 ) E 3,7 (T 3 ) E 1,5 (T 1 ) E 2,5 (T 2 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 21/34

MR-CDA - Example Node 5 receives, 3 5 C 3 E 3,5 (T 3 ) E 3,7 (T 3 ) E 1,5 (T 1 ) E 2,5 (T 2 ) Node 5 receives, 4 5 C 4 E 4,5 (T 4 ) E 4,7 (T 4 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 22/34

MR-CDA - Example 1 Node 5 decrypts, T 1 = D 1,5 (T 1 ) T 2 = D 2,5 (T 2 ) T 3 = D 3,5 (T 3 ) T 4 = D 4,5 (T 4 ) 2 Node 5 generates, T T 3 = MAC(C 3) 4 = MAC(C 4) 3 Node 5 compares, T 3 = T 3? T 4 = T 4? 4 Node 5 compares, T 3 = T 1 T 2 Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 23/34

MR-CDA - Example Node 5 computes, C 5 = C 3 C 4 T 5 = T 3 T 4 E 5,7 (T 5 ) E 5,8 (T 5 ) Node 5 transmits, 5 7 C 5 E 5,7 (T 5 ) E 5,8 (T 5 ) E 3,7 (T 3 ) E 4,7 (T 4 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 24/34

MR-CDA - Example Node 7 receives, 5 7 C 5 E 5,7 (T 5 ) E 5,8 (T 5 ) E 3,7 (T 3 ) E 4,7 (T 4 ) Node 7 receives, 6 7 C 6 E 6,7 (T 6 ) E 6,8 (T 6 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 25/34

MR-CDA - Example 1 Node 7 decrypts, T 3 = D 3,7 (T 3 ) T 4 = D 4,7 (T 4 ) T 5 = D 5,7 (T 5 ) T 6 = D 6,7 (T 6 ) 2 Node 7 generates, T T 5 = MAC(C 5) 6 = MAC(C 6) 3 Node 5 compares, T 5 = T 5? T 6 = T 6? 4 Node 7 compares, T 5 = T 3 T 4 Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 26/34

MR-CDA - Example Node 7 computes, C 7 = C 5 C 6 T 7 = T 5 T 6 E 7,8 (T 7 ) Node 7 transmits, 7 8 C 7 E 5,8 (T 5 ) E 6,8 (T 6 ) E 7,8 (T 7 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 27/34

MR-CDA - Example Node 8 receives, 7 8 C 7 E 5,8 (T 5 ) E 6,8 (T 6 ) E 7,8 (T 7 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 28/34

MR-CDA - Example 1 Node 8 decrypts, T 5 = D 5,8 (T 5 ) T 6 = D 6,8 (T 6 ) T 7 = D 7,8 (T 7 ) 2 Node 8 generates, T 7 = MAC(C 7) 3 Node 8 compares, T 7 = T 7? 4 Node 8 compares, T 7 = T 5 T 6 5 Node 8 decrypts, D BS (C 7 ) = M 1 M 2 M 4 M 6 Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 29/34

MR-CDA - Example D 7,8 (T 7 ) = MAC(C 7 )? 1 : 0 D 5,8 (T 5 ) D 6,8 (T 6 ) = D 7,8 (T 7 )? 1 : 0 8 D 5,7 (T 5 ) = MAC(C 5 )? 1 : 0 D 6,7 (T 4 ) = MAC(C 6 )? 1 : 0 D 3,7 (T 3 ) D 4,7 (T 4 ) = D 5,7 (T 5 )? 1 : 0 C 7 =C 5 C 6 & T 7 =T 5 T 6 C 7, E 7,8 (T 7 ), E 5,8 (T 5 ), E 6,8 (T 6 ) D 3,5 (T 3 ) = MAC(C 3 )? 1 : 0 D 4,5 (T 4 ) = MAC(C 4 )? 1 : 0 D 1,5 (T 1 ) D 2,5 (T 2 ) = D 3,5 (T 3 )? 1 : 0 C 5 =C 3 C 4 & T 5 =T 3 T 4 C 5, E 5,7 (T 5 ), E 5,8 (T 5 ), E 3,7 (T 3 ), E 4,7 (T 4 ) 7 5 6 C 6, E 6,7 (T 6 ), E 6,8 (T 6 ) D 1,3 (T 1 ) = MAC(C 1 )? 1 : 0 D 2,3 (T 2 ) = MAC(C 2 )? 1 : 0 C 3 =C 1 C 2 & T 3 =T 1 T 2 C 3, E 3,5 (T 3 ), E 3,7 (T 3 ), E 1,5 (T 1 ), E 2,5 (T 2 ) 3 4 C 4, E 4,5 (T 4 ), E 4,7 (T 4 ) C 1, E 1,3 (T 1 ), E 1,5 (T 1 ) 1 2 C 2, E 2,3 (T 2 ), E 2,5 (T 2 ) Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 30/34

Outline 1 Introduction 2 Preliminaries 3 MR-CDA 4 Conclusions Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 31/34

Conclusions Data Aggregation and Privacy Data aggregation - Plaintext data Privacy - Encrypted data Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 32/34

Conclusions Data Aggregation and Privacy Data aggregation - Plaintext data Privacy - Encrypted data Data Aggregation and Message Authentication Data aggregation modifies the original data Message authentication requires the original data Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 32/34

Conclusions Data Aggregation and Privacy Data aggregation - Plaintext data Privacy - Encrypted data Data Aggregation and Message Authentication Data aggregation modifies the original data Message authentication requires the original data Privacy and Message Authentication Privacy - Encrypted data Authentication - Plaintext data Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 32/34

Publication/Acknowledgement Publication Keyur Parmar and Devesh C. Jinwala, Malleability Resilient Concealed Data Aggregation, in Proceedings of the 20th EUNICE/IFIP WG 6.2, 6.6 Workshop on Advances in Communication Networking, France, ser. EUNICE 14. Lecture Notes in Computer Science (LNCS), pp. 160 172, Springer-Verlag, Berlin, Heidelberg, 2014. Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 33/34

Publication/Acknowledgement Publication Keyur Parmar and Devesh C. Jinwala, Malleability Resilient Concealed Data Aggregation, in Proceedings of the 20th EUNICE/IFIP WG 6.2, 6.6 Workshop on Advances in Communication Networking, France, ser. EUNICE 14. Lecture Notes in Computer Science (LNCS), pp. 160 172, Springer-Verlag, Berlin, Heidelberg, 2014. Acknowledgement This research is a part of the project A Secure Data Aggregation System and An Intrusion Detection System for Wireless Sensor Networks. It is supported by the Department of Electronics and Information Technology, Ministry of Communications and Information Technology, Government of India. Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 33/34

Get your facts first, then you can distort them as you please. Mark Twain Thank You... Keyur Parmar keyur.mtech@gmail.com The Tenth ICISS-2014 34/34