Department of Computer Engineering NAVSAHYADRI EDUCATION SOCIETY'S GROUP OF INSTITUTES, FACULTY OF ENGINEERING Naigaon-412206, Tal. Bhor, Dist. Pune 2012-2013 1
SPINS: Security Protocols for Sensor Networks Submitted By Abhijeet Vijay Awade Guided By Mr. A. M. Wade Seminar Topic 2 SPINS: Security Protocols for Sensor Networks
 Background  Protocols  SNEP  μTESLA  Example applications  Conclusions  Authenticated Routing  Node-to-node key agreement 3 SPINS: Security Protocols for Sensor Networks
Sensor Networks Overview 4 SPINS: Security Protocols for Sensor Networks
 Sensor networks  Nodes  Base stations  Communication channel  Communication patterns  Trust framework  Resource restrictions 5 SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks 6
 Data Confidentiality  Semantic security  Data Authentication  Point-to-point  Broadcast  Data Integrity  Data Freshness  Weak-Partial ordering.  Strong-Total ordering. 7 SPINS: Security Protocols for Sensor Networks
 Purpose: secure two-party communication  Elements  Symmetric key  Message Authentication Code  Block cipher in counter mode • Shared counter 8 SPINS: Security Protocols for Sensor Networks
 Key Setup  Bootstrap secret master key  Key generation(PRF)  Encryption  RC5  Message Authentication Code  CBC-MAC (one per packet)  {M}KE, MAC(KMAC, {M}KE) 9 SPINS: Security Protocols for Sensor Networks
 Purpose : authenticated broadcast  Phases  Sender setup  Broadcasting  Bootstrapping receivers  Receiving broadcast packets  Authenticating broadcast packets 10 SPINS: Security Protocols for Sensor Networks
 Key chain generation  Randomly pick last key Kn  Repeatedly apply one-way function F Fn(Kn) <- ... <- F(F(F(Kn)) <- F(F(Kn) <- F(Kn) <- Kn K0 = F(K1) = F(F(K2) = …  Broadcast  Key disclosure schedule • Time intervals • Current key • Interval offset 11 SPINS: Security Protocols for Sensor Networks
time P1 K0 P2 P3 P4 P5 K 1 K 2 P7P6 F K1 K2 F K3 F K4 F 1 2 3 40 K 3 K 4 12 SPINS: Security Protocols for Sensor Networks
time P1 K0 P2 P3 P4 P5 K 1 K 2 F K2K1 F 1 2 3 40 13 SPINS: Security Protocols for Sensor Networks
Authenticated routing  Build routing tree based on authenticated packets received Pair-wise key agreement 14 SPINS: Security Protocols for Sensor Networks
 SNEP  Basic node-to-base station security  Susceptible to synchronization loss?  Susceptible to packet loss?  μTESLA  Authenticated broadcast  No confidentiality 15 SPINS: Security Protocols for Sensor Networks
 D.S. Alexander; W.A. Arbaugh; A,D. Keromytis; J.M. Smith. "Safety and Security of Programmable Networks Infrastructures". IEEE Communications Magazine. IEEE,1998.  G. Chen, J Rixon, Q. KONG. Integration CORBA and Java for ATM Connection Management. IEEE connection management., 2000.  W. Stallings. Network and Internetwork Security - Principles and Practice. IEEE Press. Prentice-Hall. IEEE, 2006.  E. Simon, Distributed Information Systems - From Client/Server to Distributed Multi-media, McGraw-Hill, IEEE, 2010.  Adrian Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks, Mobile Computing and Networking 2001Rome, Italy Copyright 2001 ACM. 16 SPINS: Security Protocols for Sensor Networks
Thank You 17

SPINS: Security Protocols for Sensor Networks

  • 1.
    Department of ComputerEngineering NAVSAHYADRI EDUCATION SOCIETY'S GROUP OF INSTITUTES, FACULTY OF ENGINEERING Naigaon-412206, Tal. Bhor, Dist. Pune 2012-2013 1
  • 2.
    SPINS: Security Protocolsfor Sensor Networks Submitted By Abhijeet Vijay Awade Guided By Mr. A. M. Wade Seminar Topic 2 SPINS: Security Protocols for Sensor Networks
  • 3.
     Background  Protocols SNEP  μTESLA  Example applications  Conclusions  Authenticated Routing  Node-to-node key agreement 3 SPINS: Security Protocols for Sensor Networks
  • 4.
    Sensor Networks Overview 4 SPINS:Security Protocols for Sensor Networks
  • 5.
     Sensor networks Nodes  Base stations  Communication channel  Communication patterns  Trust framework  Resource restrictions 5 SPINS: Security Protocols for Sensor Networks
  • 6.
    SPINS: Security Protocolsfor Sensor Networks 6
  • 7.
     Data Confidentiality Semantic security  Data Authentication  Point-to-point  Broadcast  Data Integrity  Data Freshness  Weak-Partial ordering.  Strong-Total ordering. 7 SPINS: Security Protocols for Sensor Networks
  • 8.
     Purpose: securetwo-party communication  Elements  Symmetric key  Message Authentication Code  Block cipher in counter mode • Shared counter 8 SPINS: Security Protocols for Sensor Networks
  • 9.
     Key Setup Bootstrap secret master key  Key generation(PRF)  Encryption  RC5  Message Authentication Code  CBC-MAC (one per packet)  {M}KE, MAC(KMAC, {M}KE) 9 SPINS: Security Protocols for Sensor Networks
  • 10.
     Purpose :authenticated broadcast  Phases  Sender setup  Broadcasting  Bootstrapping receivers  Receiving broadcast packets  Authenticating broadcast packets 10 SPINS: Security Protocols for Sensor Networks
  • 11.
     Key chaingeneration  Randomly pick last key Kn  Repeatedly apply one-way function F Fn(Kn) <- ... <- F(F(F(Kn)) <- F(F(Kn) <- F(Kn) <- Kn K0 = F(K1) = F(F(K2) = …  Broadcast  Key disclosure schedule • Time intervals • Current key • Interval offset 11 SPINS: Security Protocols for Sensor Networks
  • 12.
    time P1 K0 P2 P3 P4P5 K 1 K 2 P7P6 F K1 K2 F K3 F K4 F 1 2 3 40 K 3 K 4 12 SPINS: Security Protocols for Sensor Networks
  • 13.
    time P1 K0 P2 P3 P4P5 K 1 K 2 F K2K1 F 1 2 3 40 13 SPINS: Security Protocols for Sensor Networks
  • 14.
    Authenticated routing  Buildrouting tree based on authenticated packets received Pair-wise key agreement 14 SPINS: Security Protocols for Sensor Networks
  • 15.
     SNEP  Basicnode-to-base station security  Susceptible to synchronization loss?  Susceptible to packet loss?  μTESLA  Authenticated broadcast  No confidentiality 15 SPINS: Security Protocols for Sensor Networks
  • 16.
     D.S. Alexander;W.A. Arbaugh; A,D. Keromytis; J.M. Smith. "Safety and Security of Programmable Networks Infrastructures". IEEE Communications Magazine. IEEE,1998.  G. Chen, J Rixon, Q. KONG. Integration CORBA and Java for ATM Connection Management. IEEE connection management., 2000.  W. Stallings. Network and Internetwork Security - Principles and Practice. IEEE Press. Prentice-Hall. IEEE, 2006.  E. Simon, Distributed Information Systems - From Client/Server to Distributed Multi-media, McGraw-Hill, IEEE, 2010.  Adrian Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks, Mobile Computing and Networking 2001Rome, Italy Copyright 2001 ACM. 16 SPINS: Security Protocols for Sensor Networks
  • 17.