CS 588: Cryptography SSeeccuurriittyy iinn SSeennssoorr NNeettwwoorrkkss By: Stavan Parikh Tracy Barger David Friedman Date: December 6, 2001iTable of Contents 1. INTRODUCTION .................................................................................................................................... 1 2. SENSOR NETWORKS............................................................................................................................ 2 2.1. CONSTRAINTS...................................................................................................................................... 2 2.1.1. Hardware .................................................................................................................................... 2 2.1.2. Energy......................................................................................................................................... 2 2.1.3. Communication & Addressing .................................................................................................... 3 2.1.4. Trust Model................................................................................................................................. 3 2.2. SECURITY REQUIREMENTS .................................................................................................................. 3 2.2.1. Confidentiality............................................................................................................................. 3 2.2.2. Authenticity ................................................................................................................................. 3 2.2.3. Integrity....................................................................................................................................... 4 2.2.4. Freshness .................................................................................................................................... 4 2.2.5 Scalability and Availability.......................................................................................................... 4 3. KEYING PROTOCOLS .......................................................................................................................... 5 3.1. OVERVIEW........................................................................................................................................... 5 3.2. PRE-DEPLOYED KEYING ...................................................................................................................... 6 3.2.1. Network-Wide Pre-deployed Keying........................................................................................... 6 3.2.2. Node-Specific Pre-deployed Keying............................................................................................ 6 3.2.3 J-Secure Pre-Deployed Keying.................................................................................................... 6 3.3. ARBITRATED PROTOCOLS.................................................................................................................... 8 3.3.1. J-Secure Modification................................................................................................................. 8 3.4. SELF-ENFORCING AUTONOMOUS KEYING PROTOCOLS ..................................................................... 11 3.4.1. Attribute-Based Keying [2] ....................................................................................................... 11 3.4. CONCLUSION ..................................................................................................................................... 12 4. AUTHENTICATION ............................................................................................................................. 13 4.1 HASH-BASED AUTHENTICATION SCHEME ......................................................................................... 13 5. SYMMETRIC ENCRYPTION SCHEMES ......................................................................................... 15 5.1 DES .................................................................................................................................................. 15 5.2 RIJNDAEL .......................................................................................................................................... 15 5.3 TWOFISH ........................................................................................................................................... 16 5.4 RC5 AND RC6 .................................................................................................................................. 16 5.5 TEA.................................................................................................................................................. 17 5.6 PERFORMANCE AND SECURITY COMPARISON ................................................................................... 18 6. SECURITY PROTOCOL FOR SENSOR NETWORKS (SPINS)..................................................... 19 6.1 SPINS REQUIREMENTS..................................................................................................................... 19 6.2 SPINS ASSUMPTIONS ....................................................................................................................... 20 6.3 SENSOR NETWORK ENCRYPTION PROTOCOL (SNEP): OVERVIEW.................................................... 20 6.4 SNEP: DETAILS ................................................................................................................................21 6.5 mTESLA: AUTHENTICATED BROADCAST ........................................................................................ 21 6.6 mTESLA: DETAILS. .......................................................................................................................... 22 7. CONCLUSION ....................................................................................................................................... 23 8. REFERENCES........................................................................................................................................ 2511. Introduction Advances in nanotechnology, wireless communication, and computing are driving the development of new embedded computing devices. Distributed Sensor Networks (DSNs) are one class of these embedded devices. DSNs have a large number of small sensor nodes,
View Full Document