SlideShare a Scribd company logo
1 of 22
KEY MANAGEMENT
TECHNIQUES IN WIRELESS
SENSOR NETWORKS
By,
Ms.J.Paruvathavardhini & Ms.S.Menaga
Outline:
 Introduction
 Security and operational requirements for Key
Management
 Key Distribution Schemes
 Promising Key Management Protocols
 Summary
 Conclusion
Introduction
 WSN is a network
formed by large
number of sensor
nodes where each
node is equipped
with a sensor to
detect physical
phenomena such as
light, heat, pressure
etc…
Introduction
 WSN devices have severe resource
constraints in terms of energy, computation
and memory.
 Key Management include the processes of key
setup, the initial distribution of keys and key
revocation (removal of the compromised key).
 Many Security-critical application that depend
on key management processes demand a
high level of fault tolerance when a node is
compromised.
Security and operational requirements
for Key Management
 Confidentiality- Nodes should not reveal data to any unintended
recipients.
 Integrity- Data should not be changed between transmissions
due to environment or malicious activity.
 Data Freshness- Old data should not be used as new.
 Authentication- Data used in decision making process should
originate from correct source.
 Robustness- When some nodes are compromised the entire
network should not be compromised.
 Self-organization- Nodes should be flexible enough to be
self-organizing (autonomous) and self-healing (failure tolerant)
 Availability- Network should not fail frequently.
Continued……
 Time Synchronization- These protocols should not be
manipulated to produce incorrect data.
 Secure Localization- Nodes should be able to accurately
and securely acquire location information.
 Accessibility- Intermediate nodes should be able to perform
data aggregation by combining data from different nodes.
 Flexibility- Nodes should be replaceable when compromised.
 Scalability- WSN should concurrently support at least 3000
nodes even with key management in place.
Key Distribution Schemes
 Three keying models are used to compare the
different relationships between WSN Security
and operational requirements
 Network Keying
 Pairwise Keying
 Group Keying
Advantages & Disadvantages
 Network Keying :
Benefits Problems
Simple Lacks
Robustness.
Allows data
aggregation
and fusion
Scalable
Able to self-
organize
Flexible
Advantages & Disadvantages
 Pairwise Keying:
Benefits Problems
Provides best
robustness.
Non-scalable.
Unable to
self-organize.
Authentication
for each node.
Not flexible.
Advantages & Disadvantages
 Group Keying: Benefits Problems
Allows Multicast. Lacks efficient storage
for group keying in
IEEE 802.15.4
Allows group
collaboration.
Difficult to set up
securely.
Better robustness than
network keying.
Cluster formation
information is
application dependent.
Adjustable scalability
Flexible.
Able to self-organize
with in cluster.
Promising Key Management
Protocols
 Eschenauer and Gligor:
This protocol is simple, elegant and provides
effective trade off between robustness and
scalability.
 In this scheme a large pool of keys are
generated (eg:10,000 keys)
 Randomly take ‘K’ keys out of the pool to
establish a key ring (K << N)
 Path Key Discovery: When two nodes
communicate they search for a common key
with in the key ring by broadcasting their
identities (ID’s) of the keys they have.
Advantages&Disadvantages:
Advantages:
 Less than N-1 keys are stored
 Scalable
Disadvantages:
 It lacks authentication process and does not clearly define any
process for revoking or refreshing keys.
 The dynamic handshaking process prevents any form of data
aggregation (eg: one event detected by two neighboring nodes will
result in two separate signals.)
 No support for collaborative operations.
 No node is guaranteed to have common key with all of its
neighbors, there is a chance that some nodes are unreachable.
 Fails to satisfy security requirement authentication and operational
requirement accessibility.
Du, Deng, Han and Varshney:
 This protocol is based on pairwise keying model. This model
extends Eschenauer and Blom's work by using the same
paradigm but instead of individual keys it uses a array of
keys.
 Blom's model is based on the idea of a symmetric matrix
multiplication, where row i column j is equivalent to row j
column i, Thus, when node i calculates key ij and node j
calculates key ji. the keys are identical, leading to a
commonly shared secret.
 In Du's pairwise key management scheme, instead of using
only one private matrix, the sink node generates i private
matrices, and each node stores a subset of these matrices
in the same manner as Eschenauer's key ring.
 When two nodes must cornmunicate, they start by
broadcasting the node Ids, the indices of key matrices they
carry and the seed of the column of the public matrix. If they
Advantages & Disadvantages
Advantages:
 It offers strong robustness against node compromise at a
reasonable scalability cost. An adversary must compromise five
times as many nodes compared with Eschenauer's scheme to
compromise the entire network.
Disadvantages:
 The complexity of the protocol increases overhead costs.
 The cluster operations are not supported because it is a pairwise
keying scheme, and neither key revocation nor key refreshing are
considered.
 Overall Du's scheme fails to satisfy accessibility and is not
competitive with simpler schemes in terms of scalability due to its
high overhead costs.
LEAP
 LEAP uses four types of keys: Indivudival, group, cluster and
pairwise shared keys.
 The authentication mechanism known as µ-TESLA is used for
the broadcast authentication of the sink node,which ensures
that the packets sent with the group are from the sink node
only.
 It also employs one-way hash-key mechanism for source
packet authentication.
 LEAP uses a pre-distribution key to help establish the four
types of keys. The individual key is first established using a
function of a seed and the ID of the node.
 Then nodes broadcast their IDs. The receiving node uses a
function, seeded with an initial key, to calculate the shared key
between it and all of its neighbors.
 Thirdly, the cluster key is distributed by the cluster head using
pairwise communication secured with the pairwise shared key.
 Lastly for distributing the network-wide group key, the sink
node broadcasts it in a multihop cluster- by-cluster manner
starting with the closest cluster.
Advantages & Disadvantages
Advantages:
 It has µ-TESLA and one-way key chain authentication
as well as key revocation and key refreshing.
 Scalability
 Able to perform cluster communications.
Disadvantages:
 It assumes that sink node is never compromised.
SHELL
 Each cluster has its own distributed key management
entity residing in a non-clusterhead node.
 The operational responsibility and key management
responsibility are separated leading to better resiliency
against node capture.
Advantages:
 The main benefit of SHELL is that it has a high robustness
against node capture.
 It supports cluster (group) communications and does not
preclude data fusion or aggregation within the clusters.
Disadvantages:
 Its structure and operation arc highly complex,
involving heterogeneous node operations and
multiple (at least seven) types of keys.
PANJA, MADRIA, AND BHARGAVA
 This protocol is based on a hierarchical group
keying scheme using the Tree-based Group
Diffie-Hellman (TGDH) protocol.
 The TGDH keying scheme has one level of general
sensor nodes and multiple levels of cluster heads; that is
there can be a head of clusters responsible for multiple
cluster heads below it in a tree-like manner
 To establish the keys in this hierarchical tree based
WSN two separate schemes are used: intra-cluster and
inter-cluster keying.
Advantages & Disadvantages
Advantages:
 The advantage of this scheme is that compared to
SHELL, it is simple and elegant and hence, easy to
implement.
 Less storage and computational costs.
 Key revocation and key refreshing problems are
addressed.
Disadvantages:
 Node addition and Node replacement are not
considered explicitly.
 Compromises for robustness.
Overall, Panja’s scheme trades off robustness to better
satisfy the self-organization, accessibility, Scalability and
Flexibility requirements
Summary
Conclusion
 Future developments could incorporate the
flexibility of LEAP with the adjustable robustness
offered by Eschenauer or Du’s scheme.
 For security-critical application SHELL seems to
offer the highest robustness but it may be
further improved to reduce implementation
complexity.
 For extremely large WSNs, improving Panja's
scheme to take advantage of its highly scalable
hierarchical feature may prove attractive.
Thank You

More Related Content

Similar to Key Management Techniques in Wireless Sensor Networks.pptx

Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONijiert bestjournal
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Sai Vikas Gunti
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionDeepika Shivagnanam
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksJPINFOTECH JAYAPRAKASH
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...IJERA Editor
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
Security Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor NetworksSecurity Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksJPINFOTECH JAYAPRAKASH
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
A Comparative Study of Group Key Management in MANET
A Comparative Study of Group Key Management in MANETA Comparative Study of Group Key Management in MANET
A Comparative Study of Group Key Management in MANETIJERA Editor
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 

Similar to Key Management Techniques in Wireless Sensor Networks.pptx (20)

Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Network
 
Paper1
Paper1Paper1
Paper1
 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key Distribution
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
Security Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor NetworksSecurity Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor Networks
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
Rain Technology
Rain TechnologyRain Technology
Rain Technology
 
A Comparative Study of Group Key Management in MANET
A Comparative Study of Group Key Management in MANETA Comparative Study of Group Key Management in MANET
A Comparative Study of Group Key Management in MANET
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Key Management Techniques in Wireless Sensor Networks.pptx

  • 1. KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS By, Ms.J.Paruvathavardhini & Ms.S.Menaga
  • 2. Outline:  Introduction  Security and operational requirements for Key Management  Key Distribution Schemes  Promising Key Management Protocols  Summary  Conclusion
  • 3. Introduction  WSN is a network formed by large number of sensor nodes where each node is equipped with a sensor to detect physical phenomena such as light, heat, pressure etc…
  • 4. Introduction  WSN devices have severe resource constraints in terms of energy, computation and memory.  Key Management include the processes of key setup, the initial distribution of keys and key revocation (removal of the compromised key).  Many Security-critical application that depend on key management processes demand a high level of fault tolerance when a node is compromised.
  • 5. Security and operational requirements for Key Management  Confidentiality- Nodes should not reveal data to any unintended recipients.  Integrity- Data should not be changed between transmissions due to environment or malicious activity.  Data Freshness- Old data should not be used as new.  Authentication- Data used in decision making process should originate from correct source.  Robustness- When some nodes are compromised the entire network should not be compromised.  Self-organization- Nodes should be flexible enough to be self-organizing (autonomous) and self-healing (failure tolerant)  Availability- Network should not fail frequently.
  • 6. Continued……  Time Synchronization- These protocols should not be manipulated to produce incorrect data.  Secure Localization- Nodes should be able to accurately and securely acquire location information.  Accessibility- Intermediate nodes should be able to perform data aggregation by combining data from different nodes.  Flexibility- Nodes should be replaceable when compromised.  Scalability- WSN should concurrently support at least 3000 nodes even with key management in place.
  • 7. Key Distribution Schemes  Three keying models are used to compare the different relationships between WSN Security and operational requirements  Network Keying  Pairwise Keying  Group Keying
  • 8. Advantages & Disadvantages  Network Keying : Benefits Problems Simple Lacks Robustness. Allows data aggregation and fusion Scalable Able to self- organize Flexible
  • 9. Advantages & Disadvantages  Pairwise Keying: Benefits Problems Provides best robustness. Non-scalable. Unable to self-organize. Authentication for each node. Not flexible.
  • 10. Advantages & Disadvantages  Group Keying: Benefits Problems Allows Multicast. Lacks efficient storage for group keying in IEEE 802.15.4 Allows group collaboration. Difficult to set up securely. Better robustness than network keying. Cluster formation information is application dependent. Adjustable scalability Flexible. Able to self-organize with in cluster.
  • 11. Promising Key Management Protocols  Eschenauer and Gligor: This protocol is simple, elegant and provides effective trade off between robustness and scalability.  In this scheme a large pool of keys are generated (eg:10,000 keys)  Randomly take ‘K’ keys out of the pool to establish a key ring (K << N)  Path Key Discovery: When two nodes communicate they search for a common key with in the key ring by broadcasting their identities (ID’s) of the keys they have.
  • 12. Advantages&Disadvantages: Advantages:  Less than N-1 keys are stored  Scalable Disadvantages:  It lacks authentication process and does not clearly define any process for revoking or refreshing keys.  The dynamic handshaking process prevents any form of data aggregation (eg: one event detected by two neighboring nodes will result in two separate signals.)  No support for collaborative operations.  No node is guaranteed to have common key with all of its neighbors, there is a chance that some nodes are unreachable.  Fails to satisfy security requirement authentication and operational requirement accessibility.
  • 13. Du, Deng, Han and Varshney:  This protocol is based on pairwise keying model. This model extends Eschenauer and Blom's work by using the same paradigm but instead of individual keys it uses a array of keys.  Blom's model is based on the idea of a symmetric matrix multiplication, where row i column j is equivalent to row j column i, Thus, when node i calculates key ij and node j calculates key ji. the keys are identical, leading to a commonly shared secret.  In Du's pairwise key management scheme, instead of using only one private matrix, the sink node generates i private matrices, and each node stores a subset of these matrices in the same manner as Eschenauer's key ring.  When two nodes must cornmunicate, they start by broadcasting the node Ids, the indices of key matrices they carry and the seed of the column of the public matrix. If they
  • 14. Advantages & Disadvantages Advantages:  It offers strong robustness against node compromise at a reasonable scalability cost. An adversary must compromise five times as many nodes compared with Eschenauer's scheme to compromise the entire network. Disadvantages:  The complexity of the protocol increases overhead costs.  The cluster operations are not supported because it is a pairwise keying scheme, and neither key revocation nor key refreshing are considered.  Overall Du's scheme fails to satisfy accessibility and is not competitive with simpler schemes in terms of scalability due to its high overhead costs.
  • 15. LEAP  LEAP uses four types of keys: Indivudival, group, cluster and pairwise shared keys.  The authentication mechanism known as µ-TESLA is used for the broadcast authentication of the sink node,which ensures that the packets sent with the group are from the sink node only.  It also employs one-way hash-key mechanism for source packet authentication.  LEAP uses a pre-distribution key to help establish the four types of keys. The individual key is first established using a function of a seed and the ID of the node.  Then nodes broadcast their IDs. The receiving node uses a function, seeded with an initial key, to calculate the shared key between it and all of its neighbors.  Thirdly, the cluster key is distributed by the cluster head using pairwise communication secured with the pairwise shared key.  Lastly for distributing the network-wide group key, the sink node broadcasts it in a multihop cluster- by-cluster manner starting with the closest cluster.
  • 16. Advantages & Disadvantages Advantages:  It has µ-TESLA and one-way key chain authentication as well as key revocation and key refreshing.  Scalability  Able to perform cluster communications. Disadvantages:  It assumes that sink node is never compromised.
  • 17. SHELL  Each cluster has its own distributed key management entity residing in a non-clusterhead node.  The operational responsibility and key management responsibility are separated leading to better resiliency against node capture. Advantages:  The main benefit of SHELL is that it has a high robustness against node capture.  It supports cluster (group) communications and does not preclude data fusion or aggregation within the clusters. Disadvantages:  Its structure and operation arc highly complex, involving heterogeneous node operations and multiple (at least seven) types of keys.
  • 18. PANJA, MADRIA, AND BHARGAVA  This protocol is based on a hierarchical group keying scheme using the Tree-based Group Diffie-Hellman (TGDH) protocol.  The TGDH keying scheme has one level of general sensor nodes and multiple levels of cluster heads; that is there can be a head of clusters responsible for multiple cluster heads below it in a tree-like manner  To establish the keys in this hierarchical tree based WSN two separate schemes are used: intra-cluster and inter-cluster keying.
  • 19. Advantages & Disadvantages Advantages:  The advantage of this scheme is that compared to SHELL, it is simple and elegant and hence, easy to implement.  Less storage and computational costs.  Key revocation and key refreshing problems are addressed. Disadvantages:  Node addition and Node replacement are not considered explicitly.  Compromises for robustness. Overall, Panja’s scheme trades off robustness to better satisfy the self-organization, accessibility, Scalability and Flexibility requirements
  • 21. Conclusion  Future developments could incorporate the flexibility of LEAP with the adjustable robustness offered by Eschenauer or Du’s scheme.  For security-critical application SHELL seems to offer the highest robustness but it may be further improved to reduce implementation complexity.  For extremely large WSNs, improving Panja's scheme to take advantage of its highly scalable hierarchical feature may prove attractive.