SlideShare a Scribd company logo
1 of 31
SPINS: Security Protocols for SensorSPINS: Security Protocols for Sensor
NetworksNetworks
By : BHUMIKA SHAH(M.E I.T)
OutlineOutline
 Introduction to sensor networks
-What are sensor network?
-Hardware
 Security for sensor networks
- Research Problem
 Proposed Techniques
- SPINS building blocks
 Applications
 Discussion
 Conclusion
Sensor networksSensor networks
Applications:
environmental monitoring and disaster
prevention
building monitoring and automation
monitoring the physical conditions of patients
(e.g., elderly people)
 battlefield
Energy consumption is an issue:
multi-hop communications in-network
processing
specially designed protocols
sleep mode
energy harvesting
Hardware specification[1]Hardware specification[1]
Is security on sensors possible at all?[1]Is security on sensors possible at all?[1]
Memory constraints:-
-memory is not enough to store even the variables of standard asymmetric
key crypto systems.
-standard implementations of symmetric key primitives (ciphers and hash
functions) need to be optimized in order to fit in the memory.
-available memory may increase in the future (price is still an issue).
-some asymmetric crypto systems may require less resources.
Processor:-
-4 MHz, 8 bit RISC processor, with 32 general purpose registers
-limited instruction set
• good support for bit- and byte-level I/O operations
• lack of arithmetic and logic operations
Battery power:-
-will remain a crucial limitation for some time
-communications consume much more energy than computation
-crypto algorithms and PROTOCOLS must be designed and optimized to
reduce energy consumption
System AssumptionsSystem Assumptions
 Communication patterns
-Node to base station (e.g. sensor readings)
-Base station to node (e.g. specific requests)
-Base station to all nodes
 Base Station
-Sufficient memory, power
-Shares secret key with each node
 Node
-Limited resources, limited trust
A
B
D
E
F
G
C
Base
Station
Communication architecture[2,3]Communication architecture[2,3]
 RF communications broadcast
– easy to eavesdrop messages
– easy to inject fake messages
– easy to delete messages (jamming)
– modification of messages on-the-fly is hard
– but: delete – modify - re-inject may work
 Typical communication patterns:
– many-to-one (nodes to base station) (measurement)
– one-to-many (base station to all nodes) (control information)
 Nodes can
– recognize packets addressed to them (addressing)
– handle broadcast messages
– forward packets toward the base station (using the routing
topology)
 The base station can access individual nodes using source routing, if
needed
Trust setup[1]Trust setup[1]
 The base station is trusted by all nodes
 Sensor nodes are untrusted
– they are unattended
– they are not tamper resistant
– they can be captured and compromised
 RF communication channels are untrusted
 Initial keys
– each node has a unique key that it shares with the base station
– compromise of this key affects only a single sensor
 Time synchronization
– upper bound on the node ‘s clock drift
Security for Sensor Networks[1]Security for Sensor Networks[1]
 Data Authentication:-
– it is easy to inject fake packets into the network
– special requirements of broadcast authentication
• symmetric MAC cannot be used
• asymmetric digital signatures are not feasible
 Data Confidentiality:-
– sensor readings might be sensitive, some control data (e.g. keys) must be kept
secret
– eavesdropping is easy.
 Data Integrity:-integrity of sensor readings and control data is important
 Data Freshness:-freshness of sensor readings is usually important and replay of
old packets is easy
– weak freshness
• provides partial message ordering, but no delay information
• useful for sensor readings
– strong freshness
• allows delay estimation
• required by time synchronization
Notation[4]Notation[4]
ContributionsContributions
SNEP
-Sensor Network Encryption Protocol
-Secures point-to-point communication
µTESLA
-Micro Timed Efficient Stream Loss-tolerant Authentication
-Provides broadcast authentication
Properties of SNEP[1]Properties of SNEP[1]
 Semantic security
– same messages are encrypted differently each time due to the different
counter value
 Data authentication and integrity by using MAC
 Weak freshness and replay protection
– counter is part of the MAC
– it ensures message ordering
 Low communication overhead
– counter is not sent, it is maintained locally by both parties
– using the block cipher in CTR mode results in a stream cipher �
 Encrypted messages has the same length as plain messages
– MAC adds only 8 bytes per message
 Reduced computational overhead
– MAC verification doesn’t need decryption
Key Generation /Setup[4]Key Generation /Setup[4]
 Nodes and base station share a master key pre-deployment
 Other keys are bootstrapped from the master key:
◦ Encryption key
◦ Message Authentication code key
◦ Random number generator key
Counter
RC5 Block
CipherKey Master KeyMAC
KeyEncryption
Keyrandom
Building blocks: SNEP[1]Building blocks: SNEP[1]
 Sensor Network Encryption Protocol (SNEP):
A B : encKenc,C(data) | macKmac(C|encKenc,C(data))
where
– encKenc,C is encryption in CTR mode with key Kenc and counter C
– macKmac is CBC-MAC computation with key Kmac
– MAC is computed over the encrypted data and counter C
– MAC length is 64 bits
– Kenc and Kmac is derived from the master key K (shared by the node and the base station)
through a one way function:
Kenc = macK(1)
Kmac = macK(2)
Authentication, Confidentiality[1]Authentication, Confidentiality[1]
 Without encryption can have only authentication
 For encrypted messages, the counter is included in the MAC
 Base station keeps current counter for every node
Node A
M, MAC(Kmac, M)
{M}<Kencr, CA>,
MAC(Kmac, CA|| {M}<Kencr, CA>)
Node B
SNEP with strong freshness[1]SNEP with strong freshness[1]
A B : NA, request
B A : encKenc,C(response) | macKmac(NA|C|encKenc,C(response))
where
– the request can use plain SNEP for confidentiality and
authentication
– NA is an unpredictable random number computed as
NA = macKrnd(S)
– after generating a random number, S is incremented by one
– Krnd is a key derived from the master key K (shared by the node
and the base station) through a one way function:
Krnd = macK(3)
and regenerated from time to time:
Krnd’ = macK (Krnd)
Strong Freshness[1]Strong Freshness[1]
• Nonce generated randomly
• Sender includes Nonce with request
• Responder include nonce in MAC, but not in reply
Node A
Request, NA
{Response}<Kencr, CB),
MAC(Kmac, NA || CB|| {Response}<encr, CB>)
Node B
Counter Exchange Protocol[1]Counter Exchange Protocol[1]
Bootstrapping counter values
Node A
CA
CB, MAC(Kmac, CA||CB)
Node B
To synchronize:
A →B : CA
B →A : CB, MAC(Kmac,CA || CB).
Code re-use in SNEP[2]Code re-use in SNEP[2]
 Only encryption part of RC5 is implemented
 This is used
– to encrypt and to decrypt (due to CTR mode) data
– to implement the MAC function
– to generate encryption and MAC keys from the master key
– to generate random numbers
Building block:Building block:
µµTESLA Authenticated BroadcastTESLA Authenticated Broadcast
 Main idea: asymmetry through delayed disclosure of authentication keys
– base station computes a MAC with a key unknown to the sensors
– base station sends and sensors receive the message with the MAC
– later, the base station discloses the key used to compute the MAC
 Assumptions:
– loose time synchronization between the base station and the sensors
– each sensor knows an upper bound on the maximum synchronization
error
– initial secret between the base station and each sensor to bootstrap the
whole mechanism
Key Setup[1]Key Setup[1]
 Main idea: One-way key chains
 K0 is initial commitment to chain
 Base station gives K0 to all nodes
Kn Kn-1 K1 K0
X
…….
F(Kn) F(K1)F(K2)
Broadcast[1]Broadcast[1]
 Divide time into intervals
 Associate Ki with interval i
 Messages sent in interval i use Ki in MAC
 Ki is revealed at time i + δ
 Nodes authenticate Ki and messages using Ki
K0 K1 K2 K3 …
0 1 2 3 4 time
δ
Broadcasting Authenticated Packets[1]Broadcasting Authenticated Packets[1]
 In interval j, base station broadcasts Msg
 Node verifies that key Kj has not been disclosed yet
 Node stores Msg
Node A Base Station
Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …)
Nonce
Msg, MAC(Kj, Msg)
Node authenticating packets[1]Node authenticating packets[1]
 After disclosure interval δ, base station broadcasts Kj
 Node verifies that F(Kj) = Kj-1, or F(F(Kj)) = Kj-2, etc.
 Node verifies MAC of Msg
 Node delivers Msg
Node A Base Station
Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …)
Nonce
Msg, MAC(Kj, Msg)
Kj
δ
Perfect robustness to packet loss[1]Perfect robustness to packet loss[1]
K2 K3 K4 K5
tTime 2 Time 3 Time 4 Time 5
K1
P5
K3
P3
K1
P2
K0
P1
K0
Verify MACs
P4
K2
FF
Authenticate K3
µµTESLA PropertiesTESLA Properties
 Asymmetry from delayed key disclosure[1]
 Self-authenticating keys[1]
 Requires loose time synchronization[3]
 Low overhead (1 MAC)
- Communication (same as SNEP)
- Computation (~ 2 MAC computations)
 Independent of number of receivers
Applications[1]Applications[1]
Authenticated Routing
Node to Node Agreement
A B: NA, A
B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B)
S A: {SKAB}KSA , MAC(K’SA,NA || A || {SKAB}KSA )
S B: {SKAB}KSB , MAC(K’SB,NB || B || {SKAB}KSB )
Discussion: DrawbacksDiscussion: Drawbacks
 The µTESLA protocol lacks scalability[1]
- require initial key commitment with each nodes, which is very
communication intensive
 SPINS uses source routing, so vulnerable to traffic analysis[2,3]
Conclusion[1,3]Conclusion[1,3]
 Strong security protocols affordable
- First broadcast authentication
 Low security overhead
- Computation, memory, communication
 Apply to future sensor networks
-Energy limitations persist
-Tendency to use minimal hardware
 Base protocol for more sophisticated security services
ReferencesReferences
[1] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D.
Tygar.”SPINS: Security Protocols for Sensor Networks”
[2] International Journal of Advanced Research in Computer Science andSoftware
Engineering[Volume- 3, Issue-8, August- 2013] “Emerging Trends in
Cryptography”
[3] Pritam Gajkumar Shah Lecturer, Telecom Engineering Department RV
College of Engineering, Bangalore ” Network Security Protocols for Wireless
Sensor Networks-A Survey ”
[4] Ali Modirkhazeni, Norafida Ithnin, Mohammadjavad Abbasi” Secure
Hierarchal Routing Protocols in Wireless Sensor Networks; Security Survey
Analysis ”
Thank youThank you

More Related Content

What's hot

Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
WDM Networks
WDM NetworksWDM Networks
WDM NetworksCKSunith1
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 

What's hot (20)

Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
WDM Networks
WDM NetworksWDM Networks
WDM Networks
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Hybrid wireless protocols
Hybrid wireless protocolsHybrid wireless protocols
Hybrid wireless protocols
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 

Viewers also liked

SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksJoon Young Park
 
Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeIAEME Publication
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
015 spins
015 spins015 spins
015 spinsSam Ram
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Viewers also liked (8)

SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchange
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
015 spins
015 spins015 spins
015 spins
 
Tesla ppt
Tesla pptTesla ppt
Tesla ppt
 
BIBA
BIBABIBA
BIBA
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to spins

Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyFReeze FRancis
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
 
Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"mohamedmohyshaheen
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks3G4G
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmVittorio Giovara
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSNvik001ind
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksEswar Publications
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project PresentationAndrew McGarry
 

Similar to spins (20)

Majorppt
MajorpptMajorppt
Majorppt
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
 
802.11i
802.11i802.11i
802.11i
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSN
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 

spins

  • 1. SPINS: Security Protocols for SensorSPINS: Security Protocols for Sensor NetworksNetworks By : BHUMIKA SHAH(M.E I.T)
  • 2. OutlineOutline  Introduction to sensor networks -What are sensor network? -Hardware  Security for sensor networks - Research Problem  Proposed Techniques - SPINS building blocks  Applications  Discussion  Conclusion
  • 3. Sensor networksSensor networks Applications: environmental monitoring and disaster prevention building monitoring and automation monitoring the physical conditions of patients (e.g., elderly people)  battlefield Energy consumption is an issue: multi-hop communications in-network processing specially designed protocols sleep mode energy harvesting
  • 5. Is security on sensors possible at all?[1]Is security on sensors possible at all?[1] Memory constraints:- -memory is not enough to store even the variables of standard asymmetric key crypto systems. -standard implementations of symmetric key primitives (ciphers and hash functions) need to be optimized in order to fit in the memory. -available memory may increase in the future (price is still an issue). -some asymmetric crypto systems may require less resources. Processor:- -4 MHz, 8 bit RISC processor, with 32 general purpose registers -limited instruction set • good support for bit- and byte-level I/O operations • lack of arithmetic and logic operations Battery power:- -will remain a crucial limitation for some time -communications consume much more energy than computation -crypto algorithms and PROTOCOLS must be designed and optimized to reduce energy consumption
  • 6. System AssumptionsSystem Assumptions  Communication patterns -Node to base station (e.g. sensor readings) -Base station to node (e.g. specific requests) -Base station to all nodes  Base Station -Sufficient memory, power -Shares secret key with each node  Node -Limited resources, limited trust A B D E F G C Base Station
  • 7. Communication architecture[2,3]Communication architecture[2,3]  RF communications broadcast – easy to eavesdrop messages – easy to inject fake messages – easy to delete messages (jamming) – modification of messages on-the-fly is hard – but: delete – modify - re-inject may work  Typical communication patterns: – many-to-one (nodes to base station) (measurement) – one-to-many (base station to all nodes) (control information)  Nodes can – recognize packets addressed to them (addressing) – handle broadcast messages – forward packets toward the base station (using the routing topology)  The base station can access individual nodes using source routing, if needed
  • 8. Trust setup[1]Trust setup[1]  The base station is trusted by all nodes  Sensor nodes are untrusted – they are unattended – they are not tamper resistant – they can be captured and compromised  RF communication channels are untrusted  Initial keys – each node has a unique key that it shares with the base station – compromise of this key affects only a single sensor  Time synchronization – upper bound on the node ‘s clock drift
  • 9. Security for Sensor Networks[1]Security for Sensor Networks[1]  Data Authentication:- – it is easy to inject fake packets into the network – special requirements of broadcast authentication • symmetric MAC cannot be used • asymmetric digital signatures are not feasible  Data Confidentiality:- – sensor readings might be sensitive, some control data (e.g. keys) must be kept secret – eavesdropping is easy.  Data Integrity:-integrity of sensor readings and control data is important  Data Freshness:-freshness of sensor readings is usually important and replay of old packets is easy – weak freshness • provides partial message ordering, but no delay information • useful for sensor readings – strong freshness • allows delay estimation • required by time synchronization
  • 11. ContributionsContributions SNEP -Sensor Network Encryption Protocol -Secures point-to-point communication µTESLA -Micro Timed Efficient Stream Loss-tolerant Authentication -Provides broadcast authentication
  • 12. Properties of SNEP[1]Properties of SNEP[1]  Semantic security – same messages are encrypted differently each time due to the different counter value  Data authentication and integrity by using MAC  Weak freshness and replay protection – counter is part of the MAC – it ensures message ordering  Low communication overhead – counter is not sent, it is maintained locally by both parties – using the block cipher in CTR mode results in a stream cipher �  Encrypted messages has the same length as plain messages – MAC adds only 8 bytes per message  Reduced computational overhead – MAC verification doesn’t need decryption
  • 13. Key Generation /Setup[4]Key Generation /Setup[4]  Nodes and base station share a master key pre-deployment  Other keys are bootstrapped from the master key: ◦ Encryption key ◦ Message Authentication code key ◦ Random number generator key Counter RC5 Block CipherKey Master KeyMAC KeyEncryption Keyrandom
  • 14. Building blocks: SNEP[1]Building blocks: SNEP[1]  Sensor Network Encryption Protocol (SNEP): A B : encKenc,C(data) | macKmac(C|encKenc,C(data)) where – encKenc,C is encryption in CTR mode with key Kenc and counter C – macKmac is CBC-MAC computation with key Kmac – MAC is computed over the encrypted data and counter C – MAC length is 64 bits – Kenc and Kmac is derived from the master key K (shared by the node and the base station) through a one way function: Kenc = macK(1) Kmac = macK(2)
  • 15. Authentication, Confidentiality[1]Authentication, Confidentiality[1]  Without encryption can have only authentication  For encrypted messages, the counter is included in the MAC  Base station keeps current counter for every node Node A M, MAC(Kmac, M) {M}<Kencr, CA>, MAC(Kmac, CA|| {M}<Kencr, CA>) Node B
  • 16. SNEP with strong freshness[1]SNEP with strong freshness[1] A B : NA, request B A : encKenc,C(response) | macKmac(NA|C|encKenc,C(response)) where – the request can use plain SNEP for confidentiality and authentication – NA is an unpredictable random number computed as NA = macKrnd(S) – after generating a random number, S is incremented by one – Krnd is a key derived from the master key K (shared by the node and the base station) through a one way function: Krnd = macK(3) and regenerated from time to time: Krnd’ = macK (Krnd)
  • 17. Strong Freshness[1]Strong Freshness[1] • Nonce generated randomly • Sender includes Nonce with request • Responder include nonce in MAC, but not in reply Node A Request, NA {Response}<Kencr, CB), MAC(Kmac, NA || CB|| {Response}<encr, CB>) Node B
  • 18. Counter Exchange Protocol[1]Counter Exchange Protocol[1] Bootstrapping counter values Node A CA CB, MAC(Kmac, CA||CB) Node B To synchronize: A →B : CA B →A : CB, MAC(Kmac,CA || CB).
  • 19. Code re-use in SNEP[2]Code re-use in SNEP[2]  Only encryption part of RC5 is implemented  This is used – to encrypt and to decrypt (due to CTR mode) data – to implement the MAC function – to generate encryption and MAC keys from the master key – to generate random numbers
  • 20. Building block:Building block: µµTESLA Authenticated BroadcastTESLA Authenticated Broadcast  Main idea: asymmetry through delayed disclosure of authentication keys – base station computes a MAC with a key unknown to the sensors – base station sends and sensors receive the message with the MAC – later, the base station discloses the key used to compute the MAC  Assumptions: – loose time synchronization between the base station and the sensors – each sensor knows an upper bound on the maximum synchronization error – initial secret between the base station and each sensor to bootstrap the whole mechanism
  • 21. Key Setup[1]Key Setup[1]  Main idea: One-way key chains  K0 is initial commitment to chain  Base station gives K0 to all nodes Kn Kn-1 K1 K0 X ……. F(Kn) F(K1)F(K2)
  • 22. Broadcast[1]Broadcast[1]  Divide time into intervals  Associate Ki with interval i  Messages sent in interval i use Ki in MAC  Ki is revealed at time i + δ  Nodes authenticate Ki and messages using Ki K0 K1 K2 K3 … 0 1 2 3 4 time δ
  • 23. Broadcasting Authenticated Packets[1]Broadcasting Authenticated Packets[1]  In interval j, base station broadcasts Msg  Node verifies that key Kj has not been disclosed yet  Node stores Msg Node A Base Station Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …) Nonce Msg, MAC(Kj, Msg)
  • 24. Node authenticating packets[1]Node authenticating packets[1]  After disclosure interval δ, base station broadcasts Kj  Node verifies that F(Kj) = Kj-1, or F(F(Kj)) = Kj-2, etc.  Node verifies MAC of Msg  Node delivers Msg Node A Base Station Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …) Nonce Msg, MAC(Kj, Msg) Kj δ
  • 25. Perfect robustness to packet loss[1]Perfect robustness to packet loss[1] K2 K3 K4 K5 tTime 2 Time 3 Time 4 Time 5 K1 P5 K3 P3 K1 P2 K0 P1 K0 Verify MACs P4 K2 FF Authenticate K3
  • 26. µµTESLA PropertiesTESLA Properties  Asymmetry from delayed key disclosure[1]  Self-authenticating keys[1]  Requires loose time synchronization[3]  Low overhead (1 MAC) - Communication (same as SNEP) - Computation (~ 2 MAC computations)  Independent of number of receivers
  • 27. Applications[1]Applications[1] Authenticated Routing Node to Node Agreement A B: NA, A B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B) S A: {SKAB}KSA , MAC(K’SA,NA || A || {SKAB}KSA ) S B: {SKAB}KSB , MAC(K’SB,NB || B || {SKAB}KSB )
  • 28. Discussion: DrawbacksDiscussion: Drawbacks  The µTESLA protocol lacks scalability[1] - require initial key commitment with each nodes, which is very communication intensive  SPINS uses source routing, so vulnerable to traffic analysis[2,3]
  • 29. Conclusion[1,3]Conclusion[1,3]  Strong security protocols affordable - First broadcast authentication  Low security overhead - Computation, memory, communication  Apply to future sensor networks -Energy limitations persist -Tendency to use minimal hardware  Base protocol for more sophisticated security services
  • 30. ReferencesReferences [1] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar.”SPINS: Security Protocols for Sensor Networks” [2] International Journal of Advanced Research in Computer Science andSoftware Engineering[Volume- 3, Issue-8, August- 2013] “Emerging Trends in Cryptography” [3] Pritam Gajkumar Shah Lecturer, Telecom Engineering Department RV College of Engineering, Bangalore ” Network Security Protocols for Wireless Sensor Networks-A Survey ” [4] Ali Modirkhazeni, Norafida Ithnin, Mohammadjavad Abbasi” Secure Hierarchal Routing Protocols in Wireless Sensor Networks; Security Survey Analysis ”

Editor's Notes

  1. Low overhead (1 MAC) Communication (same as SNEP) Computation (~ 2 MAC computations) Perfect robustness to packet loss Independent of number of receivers No digital signature required