SlideShare a Scribd company logo
1 of 21
Download to read offline
Major Works on the Necessity and
Implementations of PKC in WSNs
Presented By: Vijay Soppadandi
Pursuing M.Sc in Applied CS
Semester: Third
ID number: 21363273
1
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics
Proffesor : Dr. Dieter Hogrefe
Supervisor: Dr. Parisa Memarmoshref
Advisor : Hang Zhang
Course: Security of Self-organizing Networks
Wireless Sensors
2
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
o Low power electronic devices
o Integrated wireless communication
capabilities
Eg., Mica Mote:
Processor: 4Mhz
Memory: 128KB Flash and 4KB RAM
Radio: 916Mhz and 40Kbits/second.
Transmission range: 100 feet
Overview
Wireless sensor networks
WSNs security issues
Security threats and issues in WSNs
Goals of WSNs
PKC vs SKC
Advantages of PKC
How PKC works in WSNs
Cases for WSNs
Challenges
Types of implementations
Comparing different types of implementations
Recommendations
References
3
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Wireless Sensor Netwotks (WSNs)
4
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Gateway
network
Server: N/w &
Security manager
nodes
WSN Applications
• Environmental monitoring
War-fare, child education, surveillance, microsurgery and agriculture
• Smart buildings
Reduces the energy consumptions by controlling room temperature
• Hospital tracking systems
Tracking patients, doctors, drug administrators
5
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
WSN security
• Why do we care about security in WSN?
• Why previous security techniques are not
enough?
6
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Security threats and issues in WSN
• Security attacks are broadly classified into two categories
1) Passive Attacks
- Monitoring and Eavesdroping
- Comouflage Adversaries
2) Active Attacks
- Routing Attacks in Sensor Networks:
* Attacks on Information in transit
* Black hole / sink hole Attack
nodes
Base station
Attacker 7
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
B
Security threats and issues in WSN
• Wormholes Attacks
- Attacker records the packets at one location in N/W and tunnels those
to another location.
Attacker
Worm hole
Link
• Many others logical and physical attacks in WSNs
8
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
B Z
Y
Goals of WSNs
• Basic primary goals are:
- Data Confidentiality, Integrity, Authenticity and Availability (CIAA)
• Secounday goals are:
- Data freshnes: Needs to ensure the freshness of each message
- Self Organization: Sensor node be independent and flexible enough to be self-healing
- Secure Localization: Each and individual sensor must accurately automatically locate each
sensor in the network
9
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Basic comparission of PKC and SKC
 PKC (Public Key Cryptography)
• Two different keys
• PKC was not preffered for low-resource contrained devices
• Energy inefficient, slow and computational complex
 SKC ( Symmetric Key Cryptography)
• Similar keys
• It prefered for for low-resourse constrained devices
• Its not energy inefficient, slow and computational complex
10
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Advantages of PKC
• The primary advantage of PKC is increased security and
convenience
• It can provide digital signatures that cannot be repudiated
• PKC-based Key Distribution
-100% resilience
-100% connectivity
11
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
PKC in WSNs
• Two keys are generated
• Public key is open to all and private is belongs to owner
Ciphertext (C)
Base station (BS)
12
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
EPUB(M)->C
M
Key generator
DPRI(C)->M
Memorysensor
Public key
(PUB)
Cases for WSNs
 Complexity of key management and storage requirements in some
network settings:
- PKC allows flexiable key mangment
- Why not SKC? : Because of its complex broadcasting authentication
and delayed key disclosure
- A proper time synchronization
 Absence of pairwise key
- nodes in N/W need to send their reading to Base station, If pair
wise keys are not exist.
- PKC is useful in this case
13
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Cases for WSNs
 Offline processing and number of keys in some networks settings
- SKC needs to store a large amount keys in storage in sensor
memories before their deployment
- It increases burden and often demands more storage
- Where as in PKC, public key of the BS is embedded into sensors
 Scalability of a network
- PKC doesnt have scaliabilty problem
 Better protection under physical capture scenario
- SKC has high probability of damage if the nodes use same secreat key
- PKC can be used to establish the symmetric session keys
14
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Challenges to implement PKC in WSNs
• Enegry consumption, communication costs, computational
complexity, time complexity, security
Major barriers to implement are:
 Constrained resourse of the sensors:
Inadequate memory, processing and communication capabilities
not support excecute large amount of code
• Wireless medium:
Allows an attacker to easily intercept valid packets and inject
malicious ones
15
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Challenges to implement PKC in WSNs
• Hostile Environment:
This high hostile environment represents a serious
challange forsecurity researchers
16
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Types of Implementations
PKC-based mechanisms can be categorized mainly into
three approaches
a) Software implementations
b) Hardware implementations
c) Hardware/software blended implementations
17
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Comparing different types of implementations
18
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
Recommendations and future expectations
• Select the most suitable PK schemes based on the
topologies and the scenarios of WSN
• Next generation sensor nodes are expected to have more
energies
• Optimizing public-key protocols for sensor networks
19
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
References
Major Works on the Necessity and Implementations of PKC in
WSNs, author: AL-sakib Khan Pathan ,pp.525-545
Puccinelli, D., & Haenggi, M. (2005). Wireless sensor
networks: applications and challenges of ubiquitous sensing.
Circuits and Systems Magazine, IEEE, 5(3), 19-31.
Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless Sensor
Networks: Security Issues, Challenges and Solutions."
20
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks
END
21
Institute of Informatics Georg-August-Universitaet Goettingen, Germany
Department of Telematics Course: Security of Self-organizing Networks

More Related Content

What's hot

Self protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksSelf protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksIJNSA Journal
 
ieee project topic & abstracts in php
ieee project topic & abstracts in phpieee project topic & abstracts in php
ieee project topic & abstracts in phpaswin tbbc
 
Deep learning: the final frontier for time series analysis and signal process...
Deep learning: the final frontier for time series analysis and signal process...Deep learning: the final frontier for time series analysis and signal process...
Deep learning: the final frontier for time series analysis and signal process...Alex Honchar
 
Bypassing firewalls
Bypassing firewallsBypassing firewalls
Bypassing firewallsKumar
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEEGLOBALSOFTSTUDENTPROJECTS
 
B.tech Final year Cryptography Project
B.tech Final year Cryptography ProjectB.tech Final year Cryptography Project
B.tech Final year Cryptography ProjectShivam Vatshayan
 
Firewall ppt
Firewall pptFirewall ppt
Firewall pptRevanth71
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...LogicMindtech Nologies
 

What's hot (14)

Self protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksSelf protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networks
 
ieee project topic & abstracts in php
ieee project topic & abstracts in phpieee project topic & abstracts in php
ieee project topic & abstracts in php
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Deep learning: the final frontier for time series analysis and signal process...
Deep learning: the final frontier for time series analysis and signal process...Deep learning: the final frontier for time series analysis and signal process...
Deep learning: the final frontier for time series analysis and signal process...
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Bypassing firewalls
Bypassing firewallsBypassing firewalls
Bypassing firewalls
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
B.tech Final year Cryptography Project
B.tech Final year Cryptography ProjectB.tech Final year Cryptography Project
B.tech Final year Cryptography Project
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 

Similar to Major works on the necessity and implementations ppt

Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptxSuprithC2
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3Soon Zoo Kwon
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfMathavan N
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...IJECEIAES
 

Similar to Major works on the necessity and implementations ppt (20)

A05510105
A05510105A05510105
A05510105
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 

More from Mysa Vijay

Gui based debuggers
Gui based debuggers Gui based debuggers
Gui based debuggers Mysa Vijay
 
Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Mysa Vijay
 
Predicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market Hypothesis Predicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market Hypothesis Mysa Vijay
 
Predicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market HypothesisPredicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market HypothesisMysa Vijay
 
Security and privacy in smartphones
Security and privacy in smartphonesSecurity and privacy in smartphones
Security and privacy in smartphonesMysa Vijay
 
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mysa Vijay
 
Efficient transaction processing in sap hana
Efficient transaction processing in sap hanaEfficient transaction processing in sap hana
Efficient transaction processing in sap hanaMysa Vijay
 

More from Mysa Vijay (7)

Gui based debuggers
Gui based debuggers Gui based debuggers
Gui based debuggers
 
Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)
 
Predicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market Hypothesis Predicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market Hypothesis
 
Predicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market HypothesisPredicting Stock Market Returns and the Efficiency Market Hypothesis
Predicting Stock Market Returns and the Efficiency Market Hypothesis
 
Security and privacy in smartphones
Security and privacy in smartphonesSecurity and privacy in smartphones
Security and privacy in smartphones
 
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
 
Efficient transaction processing in sap hana
Efficient transaction processing in sap hanaEfficient transaction processing in sap hana
Efficient transaction processing in sap hana
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Major works on the necessity and implementations ppt

  • 1. Major Works on the Necessity and Implementations of PKC in WSNs Presented By: Vijay Soppadandi Pursuing M.Sc in Applied CS Semester: Third ID number: 21363273 1 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Proffesor : Dr. Dieter Hogrefe Supervisor: Dr. Parisa Memarmoshref Advisor : Hang Zhang Course: Security of Self-organizing Networks
  • 2. Wireless Sensors 2 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks o Low power electronic devices o Integrated wireless communication capabilities Eg., Mica Mote: Processor: 4Mhz Memory: 128KB Flash and 4KB RAM Radio: 916Mhz and 40Kbits/second. Transmission range: 100 feet
  • 3. Overview Wireless sensor networks WSNs security issues Security threats and issues in WSNs Goals of WSNs PKC vs SKC Advantages of PKC How PKC works in WSNs Cases for WSNs Challenges Types of implementations Comparing different types of implementations Recommendations References 3 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 4. Wireless Sensor Netwotks (WSNs) 4 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks Gateway network Server: N/w & Security manager nodes
  • 5. WSN Applications • Environmental monitoring War-fare, child education, surveillance, microsurgery and agriculture • Smart buildings Reduces the energy consumptions by controlling room temperature • Hospital tracking systems Tracking patients, doctors, drug administrators 5 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 6. WSN security • Why do we care about security in WSN? • Why previous security techniques are not enough? 6 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 7. Security threats and issues in WSN • Security attacks are broadly classified into two categories 1) Passive Attacks - Monitoring and Eavesdroping - Comouflage Adversaries 2) Active Attacks - Routing Attacks in Sensor Networks: * Attacks on Information in transit * Black hole / sink hole Attack nodes Base station Attacker 7 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks B
  • 8. Security threats and issues in WSN • Wormholes Attacks - Attacker records the packets at one location in N/W and tunnels those to another location. Attacker Worm hole Link • Many others logical and physical attacks in WSNs 8 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks B Z Y
  • 9. Goals of WSNs • Basic primary goals are: - Data Confidentiality, Integrity, Authenticity and Availability (CIAA) • Secounday goals are: - Data freshnes: Needs to ensure the freshness of each message - Self Organization: Sensor node be independent and flexible enough to be self-healing - Secure Localization: Each and individual sensor must accurately automatically locate each sensor in the network 9 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 10. Basic comparission of PKC and SKC  PKC (Public Key Cryptography) • Two different keys • PKC was not preffered for low-resource contrained devices • Energy inefficient, slow and computational complex  SKC ( Symmetric Key Cryptography) • Similar keys • It prefered for for low-resourse constrained devices • Its not energy inefficient, slow and computational complex 10 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 11. Advantages of PKC • The primary advantage of PKC is increased security and convenience • It can provide digital signatures that cannot be repudiated • PKC-based Key Distribution -100% resilience -100% connectivity 11 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 12. PKC in WSNs • Two keys are generated • Public key is open to all and private is belongs to owner Ciphertext (C) Base station (BS) 12 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks EPUB(M)->C M Key generator DPRI(C)->M Memorysensor Public key (PUB)
  • 13. Cases for WSNs  Complexity of key management and storage requirements in some network settings: - PKC allows flexiable key mangment - Why not SKC? : Because of its complex broadcasting authentication and delayed key disclosure - A proper time synchronization  Absence of pairwise key - nodes in N/W need to send their reading to Base station, If pair wise keys are not exist. - PKC is useful in this case 13 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 14. Cases for WSNs  Offline processing and number of keys in some networks settings - SKC needs to store a large amount keys in storage in sensor memories before their deployment - It increases burden and often demands more storage - Where as in PKC, public key of the BS is embedded into sensors  Scalability of a network - PKC doesnt have scaliabilty problem  Better protection under physical capture scenario - SKC has high probability of damage if the nodes use same secreat key - PKC can be used to establish the symmetric session keys 14 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 15. Challenges to implement PKC in WSNs • Enegry consumption, communication costs, computational complexity, time complexity, security Major barriers to implement are:  Constrained resourse of the sensors: Inadequate memory, processing and communication capabilities not support excecute large amount of code • Wireless medium: Allows an attacker to easily intercept valid packets and inject malicious ones 15 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 16. Challenges to implement PKC in WSNs • Hostile Environment: This high hostile environment represents a serious challange forsecurity researchers 16 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 17. Types of Implementations PKC-based mechanisms can be categorized mainly into three approaches a) Software implementations b) Hardware implementations c) Hardware/software blended implementations 17 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 18. Comparing different types of implementations 18 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 19. Recommendations and future expectations • Select the most suitable PK schemes based on the topologies and the scenarios of WSN • Next generation sensor nodes are expected to have more energies • Optimizing public-key protocols for sensor networks 19 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 20. References Major Works on the Necessity and Implementations of PKC in WSNs, author: AL-sakib Khan Pathan ,pp.525-545 Puccinelli, D., & Haenggi, M. (2005). Wireless sensor networks: applications and challenges of ubiquitous sensing. Circuits and Systems Magazine, IEEE, 5(3), 19-31. Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless Sensor Networks: Security Issues, Challenges and Solutions." 20 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks
  • 21. END 21 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Course: Security of Self-organizing Networks