Your SlideShare is downloading. ×
0
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

SPINS: Security Protocols for Sensor Networks

779

Published on

This presentation is about security protocol for sensor network..

This presentation is about security protocol for sensor network..

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
779
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
49
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Department of Computer Engineering NAVSAHYADRI EDUCATION SOCIETY'S GROUP OF INSTITUTES, FACULTY OF ENGINEERING Naigaon-412206, Tal. Bhor, Dist. Pune 2012-2013 1
  • 2. SPINS: Security Protocols for Sensor Networks Submitted By Abhijeet Vijay Awade Guided By Mr. A. M. Wade Seminar Topic 2 SPINS: Security Protocols for Sensor Networks
  • 3.  Background  Protocols  SNEP  μTESLA  Example applications  Conclusions  Authenticated Routing  Node-to-node key agreement 3 SPINS: Security Protocols for Sensor Networks
  • 4. Sensor Networks Overview 4 SPINS: Security Protocols for Sensor Networks
  • 5.  Sensor networks  Nodes  Base stations  Communication channel  Communication patterns  Trust framework  Resource restrictions 5 SPINS: Security Protocols for Sensor Networks
  • 6. SPINS: Security Protocols for Sensor Networks 6
  • 7.  Data Confidentiality  Semantic security  Data Authentication  Point-to-point  Broadcast  Data Integrity  Data Freshness  Weak-Partial ordering.  Strong-Total ordering. 7 SPINS: Security Protocols for Sensor Networks
  • 8.  Purpose: secure two-party communication  Elements  Symmetric key  Message Authentication Code  Block cipher in counter mode • Shared counter 8 SPINS: Security Protocols for Sensor Networks
  • 9.  Key Setup  Bootstrap secret master key  Key generation(PRF)  Encryption  RC5  Message Authentication Code  CBC-MAC (one per packet)  {M}KE, MAC(KMAC, {M}KE) 9 SPINS: Security Protocols for Sensor Networks
  • 10.  Purpose : authenticated broadcast  Phases  Sender setup  Broadcasting  Bootstrapping receivers  Receiving broadcast packets  Authenticating broadcast packets 10 SPINS: Security Protocols for Sensor Networks
  • 11.  Key chain generation  Randomly pick last key Kn  Repeatedly apply one-way function F Fn(Kn) <- ... <- F(F(F(Kn)) <- F(F(Kn) <- F(Kn) <- Kn K0 = F(K1) = F(F(K2) = …  Broadcast  Key disclosure schedule • Time intervals • Current key • Interval offset 11 SPINS: Security Protocols for Sensor Networks
  • 12. time P1 K0 P2 P3 P4 P5 K 1 K 2 P7P6 F K1 K2 F K3 F K4 F 1 2 3 40 K 3 K 4 12 SPINS: Security Protocols for Sensor Networks
  • 13. time P1 K0 P2 P3 P4 P5 K 1 K 2 F K2K1 F 1 2 3 40 13 SPINS: Security Protocols for Sensor Networks
  • 14. Authenticated routing  Build routing tree based on authenticated packets received Pair-wise key agreement 14 SPINS: Security Protocols for Sensor Networks
  • 15.  SNEP  Basic node-to-base station security  Susceptible to synchronization loss?  Susceptible to packet loss?  μTESLA  Authenticated broadcast  No confidentiality 15 SPINS: Security Protocols for Sensor Networks
  • 16.  D.S. Alexander; W.A. Arbaugh; A,D. Keromytis; J.M. Smith. "Safety and Security of Programmable Networks Infrastructures". IEEE Communications Magazine. IEEE,1998.  G. Chen, J Rixon, Q. KONG. Integration CORBA and Java for ATM Connection Management. IEEE connection management., 2000.  W. Stallings. Network and Internetwork Security - Principles and Practice. IEEE Press. Prentice-Hall. IEEE, 2006.  E. Simon, Distributed Information Systems - From Client/Server to Distributed Multi-media, McGraw-Hill, IEEE, 2010.  Adrian Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks, Mobile Computing and Networking 2001Rome, Italy Copyright 2001 ACM. 16 SPINS: Security Protocols for Sensor Networks
  • 17. Thank You 17

×