Security in Wireless Sensor Networks: Key Management ApproachesOverviewSensor NetworksApplicationsSecurity issues in WSNAttacks on WSNFalse routing informationSelective forwardingSinkhole and Sybil attacksWormholesWormholes (cont.)HELLO flood attackAcknowledgment spoofingOverview of CountermeasuresKey management: goalsKey management: constraintsKey management: evaluation/comparison metricsKey management approaches classificationApproaches to be discussedStraight forward approachesBasic probabilistic approachKey pre-distributionShared-key discoveryPath-key establishmentSimulation resultsKey revocationResiliency to node captureWSN connectivityRandom graphsRandom-graphs (cont.)Key ring and key pool sizesKey ring and key pool size (cont.)Key ring and key pool size: exampleq-composite approachBenefits of q-composite approachZhu / Xu approachZhu / Xu approach: key pre-distributionZhu / Xu approach: Logical path establishmentZhu / Xu: pairwise key establishmentFurther enhancementsSmart attackerSlide 44Slide 45PRK algorithmPRK algorithmPRK algorithm analysisPRK algorithm: simulationsBackground: polynomial based key pre-distributionPolynomial based key pre-distribution : initializationPolynomial based key pre-distribution : key discoveryPolynomial based key pre-distribution : examplePolynomial based key pre-distribution : generalizationLiu-Ning approachSetup phaseDirect key establishment phasePath key establishment phaseSlide 59Simulation results: comparison with already discussed approachesGrid-based key pre-distributionSubset assignmentSubset assignment (cont.)Node assignment in the gridPolynomial share discoveryPath discoveryPath discovery: examplePublic key infrastructureSymmetric vs. asymmetric algorithmsPublic key scheme for WSNArbitrated keying protocols: system modelArbitrated keying protocols: node requirementsIdentity based hierarchical keying: initialization phase (description)Identity based hierarchical keying: initialization phase (protocol)Identity based hierarchical keying: node additionIdentity based hierarchical keying: node addition (cont.)Identity based hierarchical keying: node revocationIdentity based hierarchical keying: node revocation (cont)Identity based hierarchical keying: simulationsIdentity based hierarchical keying: analysisLocation Aware Key Management for WSNLocation Aware Purely Random Key Predistribution (P-RKP)Slide 83Slide 84Slide 85Slide 86Slide 87Slide 88Slide 89Slide 90Slide 91Slide 92Slide 93Slide 94Slide 95Slide 96Slide 97Location Aware Structured Key Random Key Predistribution (SK-RKP)Location Aware SK-RKPSlide 100Key Predistribution (I –Scheme) within a given zoneKey Predistribution (E-Scheme) for adjacent zonesSlide 103Key establishment within the same zoneKey establishment within adjacent zonesPerformance AnalysisPerformance Analysis (Security)SummaryBibliographySlide 110Slide 111Security in Wireless Sensor Networks: Key Management ApproachesVasyl A. Radzevych and Sunu MathewOverview•Wireless Sensor Networks (WSN)•Security issues in WSN•Key management approaches in WSN:•Overview•Pre-Deployed Keying•Key pre-deployment•Key derivation information pre-deployment•Location aware pre-deployed keying•Random Key Pre-deployment (P-RKP)•Key derivation information pre-deployment •Autonomous protocols•Pairwise asymmetric (public key)•Arbitrated protocols•Identity based group keying•ConclusionsSensor NetworksSensor network is composed of a large number of sensor nodesSensor nodes are small, low-cost, low-power devices that have following functionality:communicate on short distancessense environmental dataperform limited data processingNetwork usually also contains “sink” node which connects it to the outside worldApplicationsWSN can be used to monitor the conditions of various objects / processes. Some examples:Military: friendly forces monitoring, battlefield surveillance, biological attack detection, targeting, battle damage assessmentEcological: fire detection, flood detection, agricultural usesHealth related: human physiological data monitoringMiscellaneous: car theft detection, inventory control, habitat monitoring, home applicationsSensors are densely deployed either inside or very close to the monitored object / processSecurity issues in WSNThe discussed applications require communication in WSN to be highly secureMain security threats in WSN are:Radio links are insecure – eavesdropping / injecting faulty information is possibleSensor nodes are not temper resistant – if it is compromised attacker obtains all security informationAttacker types:Mote-class: attacker has access to some number of nodes with similar characteristics / laptop-class: attacker has access to more powerful devicesOutside (discussed above) / inside: attacker compromised some number of nodes in the networkAttacks on WSNMain types of attacks on WSN are:spoofed, altered, or replayed routing informationselective forwarding sinkhole attacksybil attackwormholesHELLO flood attacksacknowledgment spoofingFalse routing informationInjecting fake routing control packets into the network, examples: attract / repeal traffic, generate false error messagesConsequences: routing loops, increased latency, decreased lifetime of the network, low reliabilityBA1A3A2A4Example: captured node attracts traffic by advertising shortest path to sink, high battery power, etcSelective forwardingMulti hop paradigm is prevalent in WSNIt is assumed that nodes faithfully forward received messagesCompromised node might refuse to forward packets, however neighbors might start using another routeMore dangerous: compromised node forwards selected packetsSinkhole and Sybil attacksSinkhole attack:Idea: attacker creates metaphorical sinkhole by advertising for example high quality route to a base stationLaptop class attacker can actually provide this kind of route connecting all nodes to real sink and then selectively drop packets Almost all traffic is directed to the fake sinkholeWSN are highly susceptible to this kind of attack because of the communication pattern: most of the traffic is directed towards sink – single point of failureSybil attack:Idea: a single node pretends to be present in different parts of the network. Mostly affects geographical routing protocolsWormholesIdea: tunnel packets received on one part of the network to another Well
View Full Document