SPINS: Security Protocols for Sensor Networks

  • 574 views
Uploaded on

This presentation is about security protocol for sensor network..

This presentation is about security protocol for sensor network..

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
574
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
25
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Department of Computer Engineering NAVSAHYADRI EDUCATION SOCIETY'S GROUP OF INSTITUTES, FACULTY OF ENGINEERING Naigaon-412206, Tal. Bhor, Dist. Pune 2012-2013 1
  • 2. SPINS: Security Protocols for Sensor Networks Submitted By Abhijeet Vijay Awade Guided By Mr. A. M. Wade Seminar Topic 2 SPINS: Security Protocols for Sensor Networks
  • 3.  Background  Protocols  SNEP  μTESLA  Example applications  Conclusions  Authenticated Routing  Node-to-node key agreement 3 SPINS: Security Protocols for Sensor Networks
  • 4. Sensor Networks Overview 4 SPINS: Security Protocols for Sensor Networks
  • 5.  Sensor networks  Nodes  Base stations  Communication channel  Communication patterns  Trust framework  Resource restrictions 5 SPINS: Security Protocols for Sensor Networks
  • 6. SPINS: Security Protocols for Sensor Networks 6
  • 7.  Data Confidentiality  Semantic security  Data Authentication  Point-to-point  Broadcast  Data Integrity  Data Freshness  Weak-Partial ordering.  Strong-Total ordering. 7 SPINS: Security Protocols for Sensor Networks
  • 8.  Purpose: secure two-party communication  Elements  Symmetric key  Message Authentication Code  Block cipher in counter mode • Shared counter 8 SPINS: Security Protocols for Sensor Networks
  • 9.  Key Setup  Bootstrap secret master key  Key generation(PRF)  Encryption  RC5  Message Authentication Code  CBC-MAC (one per packet)  {M}KE, MAC(KMAC, {M}KE) 9 SPINS: Security Protocols for Sensor Networks
  • 10.  Purpose : authenticated broadcast  Phases  Sender setup  Broadcasting  Bootstrapping receivers  Receiving broadcast packets  Authenticating broadcast packets 10 SPINS: Security Protocols for Sensor Networks
  • 11.  Key chain generation  Randomly pick last key Kn  Repeatedly apply one-way function F Fn(Kn) <- ... <- F(F(F(Kn)) <- F(F(Kn) <- F(Kn) <- Kn K0 = F(K1) = F(F(K2) = …  Broadcast  Key disclosure schedule • Time intervals • Current key • Interval offset 11 SPINS: Security Protocols for Sensor Networks
  • 12. time P1 K0 P2 P3 P4 P5 K 1 K 2 P7P6 F K1 K2 F K3 F K4 F 1 2 3 40 K 3 K 4 12 SPINS: Security Protocols for Sensor Networks
  • 13. time P1 K0 P2 P3 P4 P5 K 1 K 2 F K2K1 F 1 2 3 40 13 SPINS: Security Protocols for Sensor Networks
  • 14. Authenticated routing  Build routing tree based on authenticated packets received Pair-wise key agreement 14 SPINS: Security Protocols for Sensor Networks
  • 15.  SNEP  Basic node-to-base station security  Susceptible to synchronization loss?  Susceptible to packet loss?  μTESLA  Authenticated broadcast  No confidentiality 15 SPINS: Security Protocols for Sensor Networks
  • 16.  D.S. Alexander; W.A. Arbaugh; A,D. Keromytis; J.M. Smith. "Safety and Security of Programmable Networks Infrastructures". IEEE Communications Magazine. IEEE,1998.  G. Chen, J Rixon, Q. KONG. Integration CORBA and Java for ATM Connection Management. IEEE connection management., 2000.  W. Stallings. Network and Internetwork Security - Principles and Practice. IEEE Press. Prentice-Hall. IEEE, 2006.  E. Simon, Distributed Information Systems - From Client/Server to Distributed Multi-media, McGraw-Hill, IEEE, 2010.  Adrian Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks, Mobile Computing and Networking 2001Rome, Italy Copyright 2001 ACM. 16 SPINS: Security Protocols for Sensor Networks
  • 17. Thank You 17