SlideShare a Scribd company logo
1 of 31
SPINS: Security Protocols for SensorSPINS: Security Protocols for Sensor
NetworksNetworks
By : BHUMIKA SHAH(M.E I.T)
OutlineOutline
 Introduction to sensor networks
-What are sensor network?
-Hardware
 Security for sensor networks
- Research Problem
 Proposed Techniques
- SPINS building blocks
 Applications
 Discussion
 Conclusion
Sensor networksSensor networks
Applications:
environmental monitoring and disaster
prevention
building monitoring and automation
monitoring the physical conditions of patients
(e.g., elderly people)
 battlefield
Energy consumption is an issue:
multi-hop communications in-network
processing
specially designed protocols
sleep mode
energy harvesting
Hardware specification[1]Hardware specification[1]
Is security on sensors possible at all?[1]Is security on sensors possible at all?[1]
Memory constraints:-
-memory is not enough to store even the variables of standard asymmetric
key crypto systems.
-standard implementations of symmetric key primitives (ciphers and hash
functions) need to be optimized in order to fit in the memory.
-available memory may increase in the future (price is still an issue).
-some asymmetric crypto systems may require less resources.
Processor:-
-4 MHz, 8 bit RISC processor, with 32 general purpose registers
-limited instruction set
• good support for bit- and byte-level I/O operations
• lack of arithmetic and logic operations
Battery power:-
-will remain a crucial limitation for some time
-communications consume much more energy than computation
-crypto algorithms and PROTOCOLS must be designed and optimized to
reduce energy consumption
System AssumptionsSystem Assumptions
 Communication patterns
-Node to base station (e.g. sensor readings)
-Base station to node (e.g. specific requests)
-Base station to all nodes
 Base Station
-Sufficient memory, power
-Shares secret key with each node
 Node
-Limited resources, limited trust
A
B
D
E
F
G
C
Base
Station
Communication architecture[2,3]Communication architecture[2,3]
 RF communications broadcast
– easy to eavesdrop messages
– easy to inject fake messages
– easy to delete messages (jamming)
– modification of messages on-the-fly is hard
– but: delete – modify - re-inject may work
 Typical communication patterns:
– many-to-one (nodes to base station) (measurement)
– one-to-many (base station to all nodes) (control information)
 Nodes can
– recognize packets addressed to them (addressing)
– handle broadcast messages
– forward packets toward the base station (using the routing
topology)
 The base station can access individual nodes using source routing, if
needed
Trust setup[1]Trust setup[1]
 The base station is trusted by all nodes
 Sensor nodes are untrusted
– they are unattended
– they are not tamper resistant
– they can be captured and compromised
 RF communication channels are untrusted
 Initial keys
– each node has a unique key that it shares with the base station
– compromise of this key affects only a single sensor
 Time synchronization
– upper bound on the node ‘s clock drift
Security for Sensor Networks[1]Security for Sensor Networks[1]
 Data Authentication:-
– it is easy to inject fake packets into the network
– special requirements of broadcast authentication
• symmetric MAC cannot be used
• asymmetric digital signatures are not feasible
 Data Confidentiality:-
– sensor readings might be sensitive, some control data (e.g. keys) must be kept
secret
– eavesdropping is easy.
 Data Integrity:-integrity of sensor readings and control data is important
 Data Freshness:-freshness of sensor readings is usually important and replay of
old packets is easy
– weak freshness
• provides partial message ordering, but no delay information
• useful for sensor readings
– strong freshness
• allows delay estimation
• required by time synchronization
Notation[4]Notation[4]
ContributionsContributions
SNEP
-Sensor Network Encryption Protocol
-Secures point-to-point communication
µTESLA
-Micro Timed Efficient Stream Loss-tolerant Authentication
-Provides broadcast authentication
Properties of SNEP[1]Properties of SNEP[1]
 Semantic security
– same messages are encrypted differently each time due to the different
counter value
 Data authentication and integrity by using MAC
 Weak freshness and replay protection
– counter is part of the MAC
– it ensures message ordering
 Low communication overhead
– counter is not sent, it is maintained locally by both parties
– using the block cipher in CTR mode results in a stream cipher �
 Encrypted messages has the same length as plain messages
– MAC adds only 8 bytes per message
 Reduced computational overhead
– MAC verification doesn’t need decryption
Key Generation /Setup[4]Key Generation /Setup[4]
 Nodes and base station share a master key pre-deployment
 Other keys are bootstrapped from the master key:
◦ Encryption key
◦ Message Authentication code key
◦ Random number generator key
Counter
RC5 Block
CipherKey Master KeyMAC
KeyEncryption
Keyrandom
Building blocks: SNEP[1]Building blocks: SNEP[1]
 Sensor Network Encryption Protocol (SNEP):
A B : encKenc,C(data) | macKmac(C|encKenc,C(data))
where
– encKenc,C is encryption in CTR mode with key Kenc and counter C
– macKmac is CBC-MAC computation with key Kmac
– MAC is computed over the encrypted data and counter C
– MAC length is 64 bits
– Kenc and Kmac is derived from the master key K (shared by the node and the base station)
through a one way function:
Kenc = macK(1)
Kmac = macK(2)
Authentication, Confidentiality[1]Authentication, Confidentiality[1]
 Without encryption can have only authentication
 For encrypted messages, the counter is included in the MAC
 Base station keeps current counter for every node
Node A
M, MAC(Kmac, M)
{M}<Kencr, CA>,
MAC(Kmac, CA|| {M}<Kencr, CA>)
Node B
SNEP with strong freshness[1]SNEP with strong freshness[1]
A B : NA, request
B A : encKenc,C(response) | macKmac(NA|C|encKenc,C(response))
where
– the request can use plain SNEP for confidentiality and
authentication
– NA is an unpredictable random number computed as
NA = macKrnd(S)
– after generating a random number, S is incremented by one
– Krnd is a key derived from the master key K (shared by the node
and the base station) through a one way function:
Krnd = macK(3)
and regenerated from time to time:
Krnd’ = macK (Krnd)
Strong Freshness[1]Strong Freshness[1]
• Nonce generated randomly
• Sender includes Nonce with request
• Responder include nonce in MAC, but not in reply
Node A
Request, NA
{Response}<Kencr, CB),
MAC(Kmac, NA || CB|| {Response}<encr, CB>)
Node B
Counter Exchange Protocol[1]Counter Exchange Protocol[1]
Bootstrapping counter values
Node A
CA
CB, MAC(Kmac, CA||CB)
Node B
To synchronize:
A →B : CA
B →A : CB, MAC(Kmac,CA || CB).
Code re-use in SNEP[2]Code re-use in SNEP[2]
 Only encryption part of RC5 is implemented
 This is used
– to encrypt and to decrypt (due to CTR mode) data
– to implement the MAC function
– to generate encryption and MAC keys from the master key
– to generate random numbers
Building block:Building block:
µµTESLA Authenticated BroadcastTESLA Authenticated Broadcast
 Main idea: asymmetry through delayed disclosure of authentication keys
– base station computes a MAC with a key unknown to the sensors
– base station sends and sensors receive the message with the MAC
– later, the base station discloses the key used to compute the MAC
 Assumptions:
– loose time synchronization between the base station and the sensors
– each sensor knows an upper bound on the maximum synchronization
error
– initial secret between the base station and each sensor to bootstrap the
whole mechanism
Key Setup[1]Key Setup[1]
 Main idea: One-way key chains
 K0 is initial commitment to chain
 Base station gives K0 to all nodes
Kn Kn-1 K1 K0
X
…….
F(Kn) F(K1)F(K2)
Broadcast[1]Broadcast[1]
 Divide time into intervals
 Associate Ki with interval i
 Messages sent in interval i use Ki in MAC
 Ki is revealed at time i + δ
 Nodes authenticate Ki and messages using Ki
K0 K1 K2 K3 …
0 1 2 3 4 time
δ
Broadcasting Authenticated Packets[1]Broadcasting Authenticated Packets[1]
 In interval j, base station broadcasts Msg
 Node verifies that key Kj has not been disclosed yet
 Node stores Msg
Node A Base Station
Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …)
Nonce
Msg, MAC(Kj, Msg)
Node authenticating packets[1]Node authenticating packets[1]
 After disclosure interval δ, base station broadcasts Kj
 Node verifies that F(Kj) = Kj-1, or F(F(Kj)) = Kj-2, etc.
 Node verifies MAC of Msg
 Node delivers Msg
Node A Base Station
Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …)
Nonce
Msg, MAC(Kj, Msg)
Kj
δ
Perfect robustness to packet loss[1]Perfect robustness to packet loss[1]
K2 K3 K4 K5
tTime 2 Time 3 Time 4 Time 5
K1
P5
K3
P3
K1
P2
K0
P1
K0
Verify MACs
P4
K2
FF
Authenticate K3
µµTESLA PropertiesTESLA Properties
 Asymmetry from delayed key disclosure[1]
 Self-authenticating keys[1]
 Requires loose time synchronization[3]
 Low overhead (1 MAC)
- Communication (same as SNEP)
- Computation (~ 2 MAC computations)
 Independent of number of receivers
Applications[1]Applications[1]
Authenticated Routing
Node to Node Agreement
A B: NA, A
B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B)
S A: {SKAB}KSA , MAC(K’SA,NA || A || {SKAB}KSA )
S B: {SKAB}KSB , MAC(K’SB,NB || B || {SKAB}KSB )
Discussion: DrawbacksDiscussion: Drawbacks
 The µTESLA protocol lacks scalability[1]
- require initial key commitment with each nodes, which is very
communication intensive
 SPINS uses source routing, so vulnerable to traffic analysis[2,3]
Conclusion[1,3]Conclusion[1,3]
 Strong security protocols affordable
- First broadcast authentication
 Low security overhead
- Computation, memory, communication
 Apply to future sensor networks
-Energy limitations persist
-Tendency to use minimal hardware
 Base protocol for more sophisticated security services
ReferencesReferences
[1] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D.
Tygar.”SPINS: Security Protocols for Sensor Networks”
[2] International Journal of Advanced Research in Computer Science andSoftware
Engineering[Volume- 3, Issue-8, August- 2013] “Emerging Trends in
Cryptography”
[3] Pritam Gajkumar Shah Lecturer, Telecom Engineering Department RV
College of Engineering, Bangalore ” Network Security Protocols for Wireless
Sensor Networks-A Survey ”
[4] Ali Modirkhazeni, Norafida Ithnin, Mohammadjavad Abbasi” Secure
Hierarchal Routing Protocols in Wireless Sensor Networks; Security Survey
Analysis ”
Thank youThank you

More Related Content

What's hot

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
Optical Network Survivability
Optical Network SurvivabilityOptical Network Survivability
Optical Network SurvivabilityBecky Jia
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksJoon Young Park
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkBhavik Panchal
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Interferences
InterferencesInterferences
InterferencesAJAL A J
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 

What's hot (20)

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Optical Network Survivability
Optical Network SurvivabilityOptical Network Survivability
Optical Network Survivability
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor Network
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Interferences
InterferencesInterferences
Interferences
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 

Viewers also liked

Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeIAEME Publication
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
015 spins
015 spins015 spins
015 spinsSam Ram
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Viewers also liked (6)

Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchange
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
015 spins
015 spins015 spins
015 spins
 
Tesla ppt
Tesla pptTesla ppt
Tesla ppt
 
BIBA
BIBABIBA
BIBA
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to spins

Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyFReeze FRancis
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
 
Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"mohamedmohyshaheen
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks3G4G
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmVittorio Giovara
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSNvik001ind
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksEswar Publications
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project PresentationAndrew McGarry
 

Similar to spins (20)

Majorppt
MajorpptMajorppt
Majorppt
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"Short notes about "wireless sensor networks"
Short notes about "wireless sensor networks"
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
 
802.11i
802.11i802.11i
802.11i
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSN
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

spins

  • 1. SPINS: Security Protocols for SensorSPINS: Security Protocols for Sensor NetworksNetworks By : BHUMIKA SHAH(M.E I.T)
  • 2. OutlineOutline  Introduction to sensor networks -What are sensor network? -Hardware  Security for sensor networks - Research Problem  Proposed Techniques - SPINS building blocks  Applications  Discussion  Conclusion
  • 3. Sensor networksSensor networks Applications: environmental monitoring and disaster prevention building monitoring and automation monitoring the physical conditions of patients (e.g., elderly people)  battlefield Energy consumption is an issue: multi-hop communications in-network processing specially designed protocols sleep mode energy harvesting
  • 5. Is security on sensors possible at all?[1]Is security on sensors possible at all?[1] Memory constraints:- -memory is not enough to store even the variables of standard asymmetric key crypto systems. -standard implementations of symmetric key primitives (ciphers and hash functions) need to be optimized in order to fit in the memory. -available memory may increase in the future (price is still an issue). -some asymmetric crypto systems may require less resources. Processor:- -4 MHz, 8 bit RISC processor, with 32 general purpose registers -limited instruction set • good support for bit- and byte-level I/O operations • lack of arithmetic and logic operations Battery power:- -will remain a crucial limitation for some time -communications consume much more energy than computation -crypto algorithms and PROTOCOLS must be designed and optimized to reduce energy consumption
  • 6. System AssumptionsSystem Assumptions  Communication patterns -Node to base station (e.g. sensor readings) -Base station to node (e.g. specific requests) -Base station to all nodes  Base Station -Sufficient memory, power -Shares secret key with each node  Node -Limited resources, limited trust A B D E F G C Base Station
  • 7. Communication architecture[2,3]Communication architecture[2,3]  RF communications broadcast – easy to eavesdrop messages – easy to inject fake messages – easy to delete messages (jamming) – modification of messages on-the-fly is hard – but: delete – modify - re-inject may work  Typical communication patterns: – many-to-one (nodes to base station) (measurement) – one-to-many (base station to all nodes) (control information)  Nodes can – recognize packets addressed to them (addressing) – handle broadcast messages – forward packets toward the base station (using the routing topology)  The base station can access individual nodes using source routing, if needed
  • 8. Trust setup[1]Trust setup[1]  The base station is trusted by all nodes  Sensor nodes are untrusted – they are unattended – they are not tamper resistant – they can be captured and compromised  RF communication channels are untrusted  Initial keys – each node has a unique key that it shares with the base station – compromise of this key affects only a single sensor  Time synchronization – upper bound on the node ‘s clock drift
  • 9. Security for Sensor Networks[1]Security for Sensor Networks[1]  Data Authentication:- – it is easy to inject fake packets into the network – special requirements of broadcast authentication • symmetric MAC cannot be used • asymmetric digital signatures are not feasible  Data Confidentiality:- – sensor readings might be sensitive, some control data (e.g. keys) must be kept secret – eavesdropping is easy.  Data Integrity:-integrity of sensor readings and control data is important  Data Freshness:-freshness of sensor readings is usually important and replay of old packets is easy – weak freshness • provides partial message ordering, but no delay information • useful for sensor readings – strong freshness • allows delay estimation • required by time synchronization
  • 11. ContributionsContributions SNEP -Sensor Network Encryption Protocol -Secures point-to-point communication µTESLA -Micro Timed Efficient Stream Loss-tolerant Authentication -Provides broadcast authentication
  • 12. Properties of SNEP[1]Properties of SNEP[1]  Semantic security – same messages are encrypted differently each time due to the different counter value  Data authentication and integrity by using MAC  Weak freshness and replay protection – counter is part of the MAC – it ensures message ordering  Low communication overhead – counter is not sent, it is maintained locally by both parties – using the block cipher in CTR mode results in a stream cipher �  Encrypted messages has the same length as plain messages – MAC adds only 8 bytes per message  Reduced computational overhead – MAC verification doesn’t need decryption
  • 13. Key Generation /Setup[4]Key Generation /Setup[4]  Nodes and base station share a master key pre-deployment  Other keys are bootstrapped from the master key: ◦ Encryption key ◦ Message Authentication code key ◦ Random number generator key Counter RC5 Block CipherKey Master KeyMAC KeyEncryption Keyrandom
  • 14. Building blocks: SNEP[1]Building blocks: SNEP[1]  Sensor Network Encryption Protocol (SNEP): A B : encKenc,C(data) | macKmac(C|encKenc,C(data)) where – encKenc,C is encryption in CTR mode with key Kenc and counter C – macKmac is CBC-MAC computation with key Kmac – MAC is computed over the encrypted data and counter C – MAC length is 64 bits – Kenc and Kmac is derived from the master key K (shared by the node and the base station) through a one way function: Kenc = macK(1) Kmac = macK(2)
  • 15. Authentication, Confidentiality[1]Authentication, Confidentiality[1]  Without encryption can have only authentication  For encrypted messages, the counter is included in the MAC  Base station keeps current counter for every node Node A M, MAC(Kmac, M) {M}<Kencr, CA>, MAC(Kmac, CA|| {M}<Kencr, CA>) Node B
  • 16. SNEP with strong freshness[1]SNEP with strong freshness[1] A B : NA, request B A : encKenc,C(response) | macKmac(NA|C|encKenc,C(response)) where – the request can use plain SNEP for confidentiality and authentication – NA is an unpredictable random number computed as NA = macKrnd(S) – after generating a random number, S is incremented by one – Krnd is a key derived from the master key K (shared by the node and the base station) through a one way function: Krnd = macK(3) and regenerated from time to time: Krnd’ = macK (Krnd)
  • 17. Strong Freshness[1]Strong Freshness[1] • Nonce generated randomly • Sender includes Nonce with request • Responder include nonce in MAC, but not in reply Node A Request, NA {Response}<Kencr, CB), MAC(Kmac, NA || CB|| {Response}<encr, CB>) Node B
  • 18. Counter Exchange Protocol[1]Counter Exchange Protocol[1] Bootstrapping counter values Node A CA CB, MAC(Kmac, CA||CB) Node B To synchronize: A →B : CA B →A : CB, MAC(Kmac,CA || CB).
  • 19. Code re-use in SNEP[2]Code re-use in SNEP[2]  Only encryption part of RC5 is implemented  This is used – to encrypt and to decrypt (due to CTR mode) data – to implement the MAC function – to generate encryption and MAC keys from the master key – to generate random numbers
  • 20. Building block:Building block: µµTESLA Authenticated BroadcastTESLA Authenticated Broadcast  Main idea: asymmetry through delayed disclosure of authentication keys – base station computes a MAC with a key unknown to the sensors – base station sends and sensors receive the message with the MAC – later, the base station discloses the key used to compute the MAC  Assumptions: – loose time synchronization between the base station and the sensors – each sensor knows an upper bound on the maximum synchronization error – initial secret between the base station and each sensor to bootstrap the whole mechanism
  • 21. Key Setup[1]Key Setup[1]  Main idea: One-way key chains  K0 is initial commitment to chain  Base station gives K0 to all nodes Kn Kn-1 K1 K0 X ……. F(Kn) F(K1)F(K2)
  • 22. Broadcast[1]Broadcast[1]  Divide time into intervals  Associate Ki with interval i  Messages sent in interval i use Ki in MAC  Ki is revealed at time i + δ  Nodes authenticate Ki and messages using Ki K0 K1 K2 K3 … 0 1 2 3 4 time δ
  • 23. Broadcasting Authenticated Packets[1]Broadcasting Authenticated Packets[1]  In interval j, base station broadcasts Msg  Node verifies that key Kj has not been disclosed yet  Node stores Msg Node A Base Station Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …) Nonce Msg, MAC(Kj, Msg)
  • 24. Node authenticating packets[1]Node authenticating packets[1]  After disclosure interval δ, base station broadcasts Kj  Node verifies that F(Kj) = Kj-1, or F(F(Kj)) = Kj-2, etc.  Node verifies MAC of Msg  Node delivers Msg Node A Base Station Tnow, Ki, Ti, Tint, δ, MAC(Kmaster, Nonce | Tnow | …) Nonce Msg, MAC(Kj, Msg) Kj δ
  • 25. Perfect robustness to packet loss[1]Perfect robustness to packet loss[1] K2 K3 K4 K5 tTime 2 Time 3 Time 4 Time 5 K1 P5 K3 P3 K1 P2 K0 P1 K0 Verify MACs P4 K2 FF Authenticate K3
  • 26. µµTESLA PropertiesTESLA Properties  Asymmetry from delayed key disclosure[1]  Self-authenticating keys[1]  Requires loose time synchronization[3]  Low overhead (1 MAC) - Communication (same as SNEP) - Computation (~ 2 MAC computations)  Independent of number of receivers
  • 27. Applications[1]Applications[1] Authenticated Routing Node to Node Agreement A B: NA, A B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B) S A: {SKAB}KSA , MAC(K’SA,NA || A || {SKAB}KSA ) S B: {SKAB}KSB , MAC(K’SB,NB || B || {SKAB}KSB )
  • 28. Discussion: DrawbacksDiscussion: Drawbacks  The µTESLA protocol lacks scalability[1] - require initial key commitment with each nodes, which is very communication intensive  SPINS uses source routing, so vulnerable to traffic analysis[2,3]
  • 29. Conclusion[1,3]Conclusion[1,3]  Strong security protocols affordable - First broadcast authentication  Low security overhead - Computation, memory, communication  Apply to future sensor networks -Energy limitations persist -Tendency to use minimal hardware  Base protocol for more sophisticated security services
  • 30. ReferencesReferences [1] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar.”SPINS: Security Protocols for Sensor Networks” [2] International Journal of Advanced Research in Computer Science andSoftware Engineering[Volume- 3, Issue-8, August- 2013] “Emerging Trends in Cryptography” [3] Pritam Gajkumar Shah Lecturer, Telecom Engineering Department RV College of Engineering, Bangalore ” Network Security Protocols for Wireless Sensor Networks-A Survey ” [4] Ali Modirkhazeni, Norafida Ithnin, Mohammadjavad Abbasi” Secure Hierarchal Routing Protocols in Wireless Sensor Networks; Security Survey Analysis ”

Editor's Notes

  1. Low overhead (1 MAC) Communication (same as SNEP) Computation (~ 2 MAC computations) Perfect robustness to packet loss Independent of number of receivers No digital signature required