Security Sensor Network. Biswajit panja



Similar documents
SPINS: Security Protocols for Sensor Networks

Wireless Network Security Spring 2014

How To Write A Transport Layer Protocol For Wireless Networks

Client Server Registration Protocol

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Network Security. Outline of the Tutorial

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Chapter 10. Network Security

Cryptography and Network Security Chapter 9


CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Midterm. Name: Andrew user id:

CRYPTOGRAPHY IN NETWORK SECURITY

CSCE 465 Computer & Network Security

Information Security

AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Lukasz Pater CMMS Administrator and Developer

Wireless Sensor Networks Chapter 14: Security in WSNs

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Securing MANET Using Diffie Hellman Digital Signature Scheme

Overview of Public-Key Cryptography

CS 758: Cryptography / Network Security

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

Overview. SSL Cryptography Overview CHAPTER 1

Symmetric Key cryptosystem

First Semester Examinations 2011/12 INTERNET PRINCIPLES

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Content Teaching Academy at James Madison University

CHAPTER 1 INTRODUCTION

Network Security. HIT Shimrit Tzur-David

SECURITY IN NETWORKS

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Fast and Scalable Key Establishment in. Sensor Networks

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Lecture 6 - Cryptography

Chapter 7: Network security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Public Key Cryptography Overview

Notes on Network Security Prof. Hemant K. Soni

Cryptography and Network Security

TELE 301 Network Management. Lecture 18: Network Security

Authentication Application

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Secure Routing in Wireless Sensor Networks

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Security & Trust in Wireless Sensor Networks

Security in Distributed Systems. Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Security for Ubiquitous and Adhoc Networks

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

IP Security. Ola Flygt Växjö University, Sweden

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Cryptography and Network Security Chapter 14

Public Key (asymmetric) Cryptography

About the Authors Preface Acknowledgements List of Acronyms

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Practice Questions. CS161 Computer Security, Fall 2008

Security in Wireless Mesh Networks

Cryptography and Network Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Table of Contents. Bibliografische Informationen digitalisiert durch

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

SFWR ENG 4C03 - Computer Networks & Computer Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Module 7 Security CS655! 7-1!

Security in Sensor Networks: Industry Trends, Present and Future Research Directions. Sensor Networks are Here!

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Computer Networks - CS132/EECS148 - Spring

THE UNIVERSITY OF TRINIDAD & TOBAGO

Security vulnerabilities in the Internet and possible solutions

Efficient Data Transmission For Wireless Sensor Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Security: Focus of Control. Authentication

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Introduction to Cryptography

Cryptography and Network Security

Transcription:

Security Sensor Network Biswajit panja 1

Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2

Security Issues in Wired Network 3

Security Attacks Source: Network Security Essentials, William Stallings 4

Conventional Encryption Principles An encryption scheme has five ingredients: Plaintext Encryption algorithm Secret Key Ciphertext Decryption algorithm Security depends on the secrecy of the key, not the secrecy of the algorithm Source: Network Security Essentials, William Stallings 5

Conventional Encryption Principles Source: Network Security Essentials, William Stallings 6

Average time required for exhaustive key search Key Size (bits) 32 56 128 168 Number of Alternative Keys 2 32 32 = 4.3 x 10 9 56 = 7.2 x 10 16 2 56 2 128 128 = 3.4 x 10 38 2 168 168 = 3.7 x 10 50 Time required at 10 6 Decryption/µs 2.15 milliseconds 10 hours 5.4 x 10 18 years 5.9 x 10 30 years Source: Network Security Essentials, William Stallings 7

Symmetric Block Ciphers DEA TDEA International Data Encryption Blowfish Source: Network Security Essentials, William Stallings 8

Source: Network Security Essentials, William Stallings 9

Key Distribution 1. A key could be selected by A and physically delivered to B. 2. A third party could select the key and physically deliver it to A and B. 3. If A and B have previously used a key, one party could transmit the new key to the other, encrypted using the old key. 4. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B. Session key: Data encrypted with a one-time session key. At the conclusion of the session the key is destroyed Permanent key: Used between entities for the purpose of distributing session keys Source: Network Security Essentials, William Stallings 10

Source: Network Security Essentials, William Stallings 11

Encryption using Public-Key system Source: Network Security Essentials, William Stallings 12

Authentication using Public-Key System Source: Network Security Essentials, William Stallings 13

Applications for Public-Key Cryptosystems Three categories: Encryption/decryption: The sender encrypts a message with the recipient s public key. Digital signature: The sender signs a message with its private key. Key exhange: Two sides cooperate two exhange a session key. Source: Network Security Essentials, William Stallings 14

The RSA Algorithm Key Generation 1. Select p,q 2. Calculate n = p x q 3. Calculate Φ( n) = ( p 1)( q 4. Select integer e 5. Calculate d d 6. Public Key 7. Private key p and q both prime 1) gcd( Φ( n), e) = 1;1 < e 1 = e mod Φ( n) KU = {e,n} KR = {d,n} < Φ( n) Source: Network Security Essentials, William Stallings 15

Diffie-Hellman Key Echange Source: Network Security Essentials, William Stallings 16

Key Management Public-Key Certificate Use Source: Network Security Essentials, William Stallings 17

Authentication Applications: Kerberos Source: Network Security Essentials, William Stallings 18

IP Security Scenario Source: Network Security Essentials, William Stallings 19

End-to to-end versus End-to to- Intermediate Authentication Source: Network Security Essentials, William Stallings 20

Source: Network Security Essentials, William Stallings 21

Distributed Intrusion Detection Source: Network Security Essentials, William Stallings 22

Distributed Intrusion Detection Source: Network Security Essentials, William Stallings 23

Security Issues in Wireless Network

Attacks Attacks could range from deleting messages, injecting erroneous messages, impersonate a node. Poor physical protection Attacks not only from outside but also from within the network from compromised nodes 25

Key Management and Routing A single key management service for an Ad-hoc network is not a good idea - CA may be down/unavailable - CA compromises Secure routing is an issue with dynamically changing network. False routing information generated by compromised nodes 26

Used key agreement Certificate based key agreement public key certificates can allow participants to verify the binding between the IP address and keys of other participants. Disadvantage - Difficult to determine if the certificate presented by the participant has been revoked 27

Password based Authenticated Key Exchange Password is chosen and shared among the nodes Desirable properties:-secrecy, Perfect Forward Secrecy, Contributory key agreement, Tolerance to disruption attempts Protocol:- Diffie-Hellman 28

Problems associated with Ad-hoc Routing Frequent changes in network topology Problems associated with wireless communication Trust relationship between neighbors Throughput Attacks using modification of protocol fields of messages 29

Some Approaches Using pre-deployed security infrastructure Using independent Security Agents (SA) Installing extra facilities in the network to mitigate routing misbehavior 30

Security Issues in Sensor Network

Requirements Confidentiality Authenticity Integrity Freshness Scalability Availability Accessibility Self-Organization Flexibility Source: Constraints and approaches for distributed network security, NAI Lab 32

Sensor Node Constraints Battery Power/Energy - Computational Energy Consumption - Communications Energy Consumption Rechargeability Sleep Patterns Transmission Range Memory - Program Storage and Working Memory - Programmable Storage for Security Information Location Sensing Tamper Protection Time Unattended Operations Source: Constraints and approaches for distributed network security, NAI Lab 33

Networking Constraints Ad hoc Networking Limited Pre-Configuration Data Rate/Packet Size Channel error rate Intermittent connectivity Unreliable communications Latency Unicast vs. multicast Unidirectional Communications Isolated subgroups Frequent Routing Changes Population Density Unknown Recipients Source: Constraints and approaches for distributed network security, NAI Lab 34

Sensor Network Encryption Protocol (SNEP) E = {D}{ (kencr,, c), M=MAC(kmac MAC(kmac, c {D} (kencr,c kencr,c) ) A->B: {D}{ (kencr,, c), M=MAC(kmac MAC(kmac, c {D} (kencr,c kencr,c) ) Advantages: - Semantic security: Same message get encrypted differently because of counter - Data authentication: MAC verifies - Low communication overhead Source: SPINS: Security protocol for sensor network 35

Micro TESLA Delayed disclosure of symmetric keys. Sender computes a MAC with message and a secret key. Receiver node stores the msg with MAC in buffer, not the key yet. K i = F(K i+1 ) Source: SPINS: Security protocol for sensor network 36

Micro TESLA Each key corresponds to a time interval, and packets send in that interval used that key. F F F K0 K1 K2 K3 Time K0 = F(F(k2)), If key lost it can be calculated using the function. So, the packets can be authenticated using the key. Source: SPINS: Security protocol for sensor network 37

Flat Architecture Cluster head Relay nodes M1 M2 Mn Mn-1 M3 Mn-2 38

Higher level cluster head makes a decision after Collecting group data Reports to higher level Cluster head Report to cluster head Removes dup data (1,0) (1,1) (2,0) (2,1) (2,2) (1,2) (2,3) (2,4) (1,0) (2,1) (2,0) (2,2) (1,0) (2,1) (2,0) (2,2) group

Multi party Diffie-Hellman g s1s2s3s4 M10 Cluster head g s4s5s6s11 M11 gs1s2..........s13 Broadcast M12 g s7s8s9s12 Session Key g s1 M1 g s2 M2 g s3 M3 g s4 M4 g s5 g s6 M6 M5 g s7 M7 g s8 M8 g s9 M9

Another approach 41

Questions?