Random Key-Assignment for Secure Wireless Sensor Networks

29
Random Key-Assignment for Secure Wireless Sensor Networks Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei

Transcript of Random Key-Assignment for Secure Wireless Sensor Networks

Page 1: Random Key-Assignment for Secure Wireless Sensor Networks

Random Key-Assignment for Secure Wireless Sensor

NetworksRoberto Di Pietro, Luigi V. Mancini and

Alessandro Mei

Page 2: Random Key-Assignment for Secure Wireless Sensor Networks

Limited memory Limited computational power Limited energy

Sensor nodes

Page 3: Random Key-Assignment for Secure Wireless Sensor Networks

Secure microcontroller

Page 4: Random Key-Assignment for Secure Wireless Sensor Networks

Passive attacks◦ Cipher text attacks

Active attacks◦ Take control of a sensor node

Unfriendly environment Nodes only trust themselves

Threat Model

Page 5: Random Key-Assignment for Secure Wireless Sensor Networks

Secure pairwise communication Memory efficient Energy efficient Tolerate the collusion of a set of corrupted

sensors

Goals

Page 6: Random Key-Assignment for Secure Wireless Sensor Networks

Have one master key◦ Can’t tolerate nodes being taken over

Each node stores a seperate key for every other node◦ Requires too much space◦ Expensive to add more nodes later

Tradeoff◦ Use less memory, but have only a probabilistic

tolerance to nodes being taken over

Naïve solutions

Page 7: Random Key-Assignment for Secure Wireless Sensor Networks

One way hash function Symmetric encryption Keyed hashed function Pseudo-random number generator

Requirements

Page 8: Random Key-Assignment for Secure Wireless Sensor Networks

A key deployment scheme A key discovery procedure A security adaptive channel establishment

procedure

The direct protocol

Page 9: Random Key-Assignment for Secure Wireless Sensor Networks

Method used in A key-managementscheme for distributed sensor networks:

A pool of P random keys is generated Each sensors takes k random keys from the

pool

Key deployment

Page 10: Random Key-Assignment for Secure Wireless Sensor Networks

Challenge is encrypted using each key and then broadcasted

Needs to perform k^2 decryptions on receiver side and k encryptions on the sender side

At least k messages have to be sent

Inefficient key discovery

Page 11: Random Key-Assignment for Secure Wireless Sensor Networks

Also used in A key management scheme for distributed sensor networks

Instead of challenge response, submit the indexes

Less secure, as a smart attacker can easily find the nodes that have the key it wants

Key deployment II

Page 12: Random Key-Assignment for Secure Wireless Sensor Networks

Method used in Establishing pair-wise keys forsecure communication in ad hoc networks: Aprobabilistic approach: A pool of P random keys is generated k indexes into the pool are created pseudo-

randomly with a publicly known seed dependent on the node id.

Less secure than challenge-response, but can be improved

Key deployment III

Page 13: Random Key-Assignment for Secure Wireless Sensor Networks

Channel existence

Page 14: Random Key-Assignment for Secure Wireless Sensor Networks

Find out which keys are shared and xor them together

An attacker needs to know all shared keys

Channel establishment

Page 15: Random Key-Assignment for Secure Wireless Sensor Networks

Corruption probability – P=1000

Page 16: Random Key-Assignment for Secure Wireless Sensor Networks
Page 17: Random Key-Assignment for Secure Wireless Sensor Networks

Corruption Probability – k=120

Page 18: Random Key-Assignment for Secure Wireless Sensor Networks

The cooperative protocol

Page 19: Random Key-Assignment for Secure Wireless Sensor Networks

Nearby sensors◦ Weaker against geographically attacks

Random◦ Larger communication overhead

Individual properties◦ More trusted nodes can give higher security

The C set

Page 20: Random Key-Assignment for Secure Wireless Sensor Networks

They give an upper bound on the probability that the channel between two nodes is corrupted, given w corrupted nodes

Upper bound

Page 21: Random Key-Assignment for Secure Wireless Sensor Networks

Sensor failure resistent◦ Can add more sensors if required

No information leakage◦ Sensors in the C set only transmits hash values of

their keys Adaptiveness

◦ If an upper bound of w is known, C can be chosen to secure communication with a desired probability.

Load balance◦ a sends c+1 message, sensors in C send 1,

tot=2c+1◦ Only done once during setup

Features of cooperation protocol

Page 22: Random Key-Assignment for Secure Wireless Sensor Networks

Sensor doesn’t respond◦ After timeout, node a can pick another node

Sensor sends correct key◦ Lowers security

Sends false key◦ Can pick another C set◦ Notify trusted base-station◦ Aware that network is under attack

DoS Attacks of Malicious Cooperators

Page 23: Random Key-Assignment for Secure Wireless Sensor Networks

If node a has the keys that node a should have, according to the pseudo-random number generator, it’s probable that a is a.

Authentication

Page 24: Random Key-Assignment for Secure Wireless Sensor Networks

P=1000 and w=8

Page 25: Random Key-Assignment for Secure Wireless Sensor Networks

P=1000 w=16

Page 26: Random Key-Assignment for Secure Wireless Sensor Networks

P=10000 w=32

Page 27: Random Key-Assignment for Secure Wireless Sensor Networks

M = {} for all keys k in P

◦ z = RND(id||k)◦ if(z%(|P|/m)==0)

put k into M

|M| must be less than memory size but larger than the security constraints

Discard ID if conditions not satisfied

Efficient and Secure Pre-deployment (ESP)

Page 28: Random Key-Assignment for Secure Wireless Sensor Networks

Generated IDs

Page 29: Random Key-Assignment for Secure Wireless Sensor Networks

Direct protocol