Department of Computer Engineering
NAVSAHYADRI EDUCATION SOCIETY'S
GROUP OF INSTITUTES,
FACULTY OF ENGINEERING
Naigaon-412...
SPINS: Security Protocols for Sensor Networks
Submitted By
Abhijeet Vijay Awade
Guided By
Mr. A. M. Wade
Seminar Topic
2
S...
 Background
 Protocols
 SNEP
 μTESLA
 Example applications
 Conclusions
 Authenticated Routing
 Node-to-node key a...
Sensor Networks Overview
4
SPINS: Security Protocols for Sensor Networks
 Sensor networks
 Nodes
 Base stations
 Communication channel
 Communication patterns
 Trust framework
 Resource re...
SPINS: Security Protocols for Sensor Networks
6
 Data Confidentiality
 Semantic security
 Data Authentication
 Point-to-point
 Broadcast
 Data Integrity
 Data Fres...
 Purpose: secure two-party communication
 Elements
 Symmetric key
 Message Authentication Code
 Block cipher in count...
 Key Setup
 Bootstrap secret master key
 Key generation(PRF)
 Encryption
 RC5
 Message Authentication Code
 CBC-MAC...
 Purpose : authenticated broadcast
 Phases
 Sender setup
 Broadcasting
 Bootstrapping receivers
 Receiving broadcast...
 Key chain generation
 Randomly pick last key Kn
 Repeatedly apply one-way function F
Fn(Kn) <- ... <- F(F(F(Kn)) <- F(...
time
P1
K0
P2 P3 P4 P5
K
1
K
2
P7P6
F
K1 K2
F
K3
F
K4
F
1 2 3 40
K
3
K
4
12
SPINS: Security Protocols for Sensor Networks
time
P1
K0
P2 P3 P4 P5
K
1
K
2
F
K2K1
F
1 2 3 40
13
SPINS: Security Protocols for Sensor Networks
Authenticated routing
 Build routing tree based on authenticated packets received
Pair-wise key agreement
14
SPINS: Sec...
 SNEP
 Basic node-to-base station security
 Susceptible to synchronization loss?
 Susceptible to packet loss?
 μTESLA...
 D.S. Alexander; W.A. Arbaugh; A,D. Keromytis; J.M. Smith. "Safety and
Security of Programmable Networks Infrastructures"...
Thank You
17
Upcoming SlideShare
Loading in...5
×

SPINS: Security Protocols for Sensor Networks

850

Published on

This presentation is about security protocol for sensor network..

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
850
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
52
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "SPINS: Security Protocols for Sensor Networks"

  1. 1. Department of Computer Engineering NAVSAHYADRI EDUCATION SOCIETY'S GROUP OF INSTITUTES, FACULTY OF ENGINEERING Naigaon-412206, Tal. Bhor, Dist. Pune 2012-2013 1
  2. 2. SPINS: Security Protocols for Sensor Networks Submitted By Abhijeet Vijay Awade Guided By Mr. A. M. Wade Seminar Topic 2 SPINS: Security Protocols for Sensor Networks
  3. 3.  Background  Protocols  SNEP  μTESLA  Example applications  Conclusions  Authenticated Routing  Node-to-node key agreement 3 SPINS: Security Protocols for Sensor Networks
  4. 4. Sensor Networks Overview 4 SPINS: Security Protocols for Sensor Networks
  5. 5.  Sensor networks  Nodes  Base stations  Communication channel  Communication patterns  Trust framework  Resource restrictions 5 SPINS: Security Protocols for Sensor Networks
  6. 6. SPINS: Security Protocols for Sensor Networks 6
  7. 7.  Data Confidentiality  Semantic security  Data Authentication  Point-to-point  Broadcast  Data Integrity  Data Freshness  Weak-Partial ordering.  Strong-Total ordering. 7 SPINS: Security Protocols for Sensor Networks
  8. 8.  Purpose: secure two-party communication  Elements  Symmetric key  Message Authentication Code  Block cipher in counter mode • Shared counter 8 SPINS: Security Protocols for Sensor Networks
  9. 9.  Key Setup  Bootstrap secret master key  Key generation(PRF)  Encryption  RC5  Message Authentication Code  CBC-MAC (one per packet)  {M}KE, MAC(KMAC, {M}KE) 9 SPINS: Security Protocols for Sensor Networks
  10. 10.  Purpose : authenticated broadcast  Phases  Sender setup  Broadcasting  Bootstrapping receivers  Receiving broadcast packets  Authenticating broadcast packets 10 SPINS: Security Protocols for Sensor Networks
  11. 11.  Key chain generation  Randomly pick last key Kn  Repeatedly apply one-way function F Fn(Kn) <- ... <- F(F(F(Kn)) <- F(F(Kn) <- F(Kn) <- Kn K0 = F(K1) = F(F(K2) = …  Broadcast  Key disclosure schedule • Time intervals • Current key • Interval offset 11 SPINS: Security Protocols for Sensor Networks
  12. 12. time P1 K0 P2 P3 P4 P5 K 1 K 2 P7P6 F K1 K2 F K3 F K4 F 1 2 3 40 K 3 K 4 12 SPINS: Security Protocols for Sensor Networks
  13. 13. time P1 K0 P2 P3 P4 P5 K 1 K 2 F K2K1 F 1 2 3 40 13 SPINS: Security Protocols for Sensor Networks
  14. 14. Authenticated routing  Build routing tree based on authenticated packets received Pair-wise key agreement 14 SPINS: Security Protocols for Sensor Networks
  15. 15.  SNEP  Basic node-to-base station security  Susceptible to synchronization loss?  Susceptible to packet loss?  μTESLA  Authenticated broadcast  No confidentiality 15 SPINS: Security Protocols for Sensor Networks
  16. 16.  D.S. Alexander; W.A. Arbaugh; A,D. Keromytis; J.M. Smith. "Safety and Security of Programmable Networks Infrastructures". IEEE Communications Magazine. IEEE,1998.  G. Chen, J Rixon, Q. KONG. Integration CORBA and Java for ATM Connection Management. IEEE connection management., 2000.  W. Stallings. Network and Internetwork Security - Principles and Practice. IEEE Press. Prentice-Hall. IEEE, 2006.  E. Simon, Distributed Information Systems - From Client/Server to Distributed Multi-media, McGraw-Hill, IEEE, 2010.  Adrian Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks, Mobile Computing and Networking 2001Rome, Italy Copyright 2001 ACM. 16 SPINS: Security Protocols for Sensor Networks
  17. 17. Thank You 17
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×