Securing wireless sensor networks ODU Sensor Network Research Group Stephan Olariu Ashraf Wadaa Larry Wilson Kennie Jones ODU ODU ODU NASA LANGLEY
Agenda What are wireless sensor networks (WSNs)? Security Goals Toward Security Products Conclusions Future Research and Development Listing of Publications/talks
An generic sensor network Satellite Sink Event Internet End user
Sensor networks Wireless sensor network massive collection of tiny sensors linked by a wireless medium Main goal: global info from local data Must integrate sensing, data fusion and lowpower communication Must work unattended Amorphous à self-organized Massive fault tolerance An inherently distributed platform
The virtual infrastructure Dynamic coordinate system Cluster structure Work model Task-based management TA
Ubiquitous WSNs/ Temporary Infrastructures Sensor nodes Remote security monitoring station Command Node Command Node Command Node Agile multi-service sensor network system self-organized to serve a rescue
Sensors Each sensor packs: micro-sensor technology low power signal processing low power computation low power networking capabilities Non-renewable energy budget Anonymity: no fabrication-time identity Sleep as much as possible - conserve energy Sense and compute freely limit communication- conserve energy
Security goals addressed Availability: ensure the survivability of network services despite denial-of-service (DoS) attacks Confidentiality: ensure that information is not disclosed to unauthorized entities Integrity: guarantee that a message being transferred is not corrupted Authentication: enable a node to ensure the identity of the peer node Anonymity: hide the identity of sources, destinations, and routes Tamper Proofing: Ensure that nodes cannot be physically forced to divulge secrets
FH illustration
NSA Tamper proofing, authentication After deployment each sensor transmits on a specified sets of frequencies Each sensor collects an array of signal strengths from the sensors in its locale NSA the Neighborhood Signature Array Removal from deployment area à changes in the NSA
Randomized Routing
Color Graphs
Color paths
Security techniques in a nutshell Initialize sensors with secrets and synchronize clocks Deploy sensors over the desired area FH communications only NSA Resynchronize clocks periodically Train the sensors to provide temporary virtual infrastructure Assign tasks to the trained network Randomly vary sources, destinations and communication paths Partition the network into color sets - concurrent tasking Lightweight data encryption available
Grant Results Invited book chapters 3 Journal Articles 6 International Conference Proceedings 7 Presentations - 9 NSF Proposals - 4 Two PhD dissertations nearing completion Third dissertation in preliminary stages NASA proposals 3, One funded - 1 Collaborations with JMU and VA Tech
Conclusions Contributions: Virtual infrastructure leveraged for security Physical level encoding via FH, very light weight and highly effective DoS, Confidentiality, Integrity NSA Authentication, Tamper Proofing Software Random routing - Anonymity Current Situation: Wireless sensor network research is still in its infancy Securing sensor networks a subject for active research
Future Directions of this group Partner with industry to market results. Extend and improve results with an emphasis on implementation and marketing. Further progress on the open research questions required by WSNs. Continue collaborations
Publications acknowledging the current grant Invited Chapters 1. D. Gracanin, M. Eltoweissy, S. Olariu, and A. Wadaa, Dependability Support in Wireless Sensor Networks, in H. Diab and A.Y. Zomaya, Eds, Dependable Systems, John Wiley and Sons, 2004. 2. S. Olariu, K. Maly, E.C. Foudriat, S. M. Yamany and T. Luckenbach, A Dependable Architecture for Telemedicine in Support of Disaster Relief, in H. Diab and A.Y. Zomaya, Eds, Dependable Systems, John Wiley and Sons, 2004. 3. K. H. Jones, K. N. Lodding, S. Olariu, A. Wadaa, L. Wilson and M. Eltoweissy, Biomimetic Models for Wireless Sensor Networks, in S. Olariu and A. Y. Zomaya, Eds, Bio-Inspired Paradigms in Computer Science, CRC Press, Boca Raton, Florida, August 2004.
Publications acknowledging the current grant Archival Journals 1. L. Wang and S. Olariu, A unifying look at clustering in mobile ad-hoc networks, Journal of Wireless Communications and Mobile Computing, to appear, 2004. 2. S. Olariu, A. Wadaa, L. Wilson, and M. Eltoweissy, Wireless sensor networks - Leveraging the Virtual Infrastructure, IEEE Network, August 2004, to appear. 3. A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, and K. Jones, Training a Sensor Network, Mobile Networks and Applications (MONET), June 2004, to appear. 4. A. Wadaa, K. Jones, S. Olariu, and M. Eltoweissy; and L. Wilson, A Scalable Solution for Securing Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, submitted. 5. A. Wadaa, S. Olariu, and L. Wilson, and M. Eltoweissy, Scalable Cryptographic Key Management in Wireless Sensor Networks, Journal of Ad Hoc Networks: Special issue on Data Communications and Topology Control in Ad Hoc Networks, Elsevier Publishers, accepted for publication. 6. S. Olariu, A. Wadaa, M. Eltoweissy, D. Gracanin, and L. Wilson, Anonymity in Sensor Networks: Time-Frequency Randomization of Virtual Communication Graphs, International Journal of Wireless and Mobile Communications, Special Issue on Wireless Ad Hoc Networking, Interscience Publishers, to appear, 2004.
Publications acknowledging the current grant International Conference Proceedings 7. D. Gracanin, M. Eltoweissy, S. Olariu, A. Wadaa, On Modeling Wireless Sensor Networks, Proc. International Workshop on Wireless, Mobile and Ad Hoc Networks (WMAN)}, Santa Fe, NM, April 2004. 8. A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy and K. Jones, On providing anonymity in wireless sensor networks, International Conference on Parallel and Distributed Systems, (ICPADS-2004), Newport Beach, California, July 2004. 9. A. Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy gwise: A Group Key Management Scheme for Wireless Sensor Networks, IEEE Mediterranean Electro-technical Conference, Croatia, May 2004. 10. S. Olariu, K. Maly, E. C. Foudriat and S. Yamany, Wireless support for telemedicine in disaster management, International Conference on Parallel and Distributed Systems, (ICPADS-2004), Newport Beach, California, July 2004. 11. K. Jones, A.Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy, Towards a New Paradigm for Securing Wireless Sensor Networks, NSPW 2003, August 18 th - 21 st, 2003. Ascona, Switzerland, Proceedings New Security Paradigms Workshop 2003, pp 115-122. 12. A. Wadaa, S. Olariu, L. Wilson, K. Jones and Q Xu, On Training a Sensor Network, International Workshop on Wireless, Mobile and Ad Hoc Networks (WMAN), Nice, France, April 26, 2003. 13. A. Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy, Scalable key management for secure communications in wireless sensor networks, Proc. International Workshop on Wireless Ad-hoc Networking, Tokyo, Japan, March 23-26, 2004.
Presentations acknowledging the current grant 1. Security in wireless networks, Hampton University, February 2003. 2. State of the art in wireless sensor networks, Invited talk, WMAN'2003, April2003, Nice, France. 3. Securing wireless sensor networks, NRL, May 2003. 4. Wireless sensor networks, University of Burgundy, Dijon, France, June 2003. 5. Energy-efficient protocols in wireless networks, Humboldt University, Berlin, Germany, July 2003 6. Securing wireless sensor networks -- new paradigms, Free Universitaet, Berlin, Germany, July 2003. 7. Securing wireless sensor networks -- a new paradigm, University of Bologna, Italy, July 2003. 8. Wireless sensor networks, Virginia Tech, October 2003 9. Security issues in wireless sensor networks, Kent State University, January 2004.