wireless network keys management what is wsn ? steven du id: 3880740. csi 5148
Post on 19-Jan-2016
220 Views
Preview:
TRANSCRIPT
Wireless Network Keys Management
What is WSN ?
Steven Du ID: 3880740. CSI 5148
Wireless Network Keys Management
Communication Security between sensor node
Because of memory and computation constraint in WSN
use symmetric keys for encryption and decryption sensors use common shared key to encrypt and
decrypt common shared keys are pre-distributed or
computed by specific scheme
The Globus Toolkit 4 Programmer's Tutorial Borja Sotomayor, University of Chicago, Department of Computer Science. Copyright © 2004, 2005 Borja Sotomayor
Wireless Network Keys Management
Key establishment schemes
Definition of key establishment:The algorithm or method for sensors to setup (or exchange) their common shared key for communication data
Main requirements on key establishment schemes:1. Availability : The network service is available without limitation with key
establishment 2. Authenticity: Ability for verifying that the message sent by a node is
authentic.3. Confidentiality : The key establishment technique should protect the
disclosure of data to unauthorized parties.4. Integrity : No falsification of data during transmission.
Key Pre-distribution in Wireless Sensor Networks when Sensors are within Communication Range Sushmita Ruj, Amiya Nayak and Ivan Stojmenovic
Wireless Network Keys Management
WSN symmetric key establishment steps:1. Key pre-distribution: Preload keys into each sensor nodes before WSN
deployment. 2. Shared-key discovery: Setup connection between two sensor nodes in their
communication range by finding common shared key.3. Path-key establishment : establishment of communication path and path key
between two unconnected sensor nodes. Path: linked nodes chain between two nodes without direct connectionPath key: Common shared key used by the linked nodes in path to transfer message
B
S
E
C
F
D
K
G
Key sb
Key be
Key bcKey SD
Key ef
Key fg
Key
gd
Key kd
Key
fk
Wireless Network Keys Management
WSN symmetric key establishment steps:1. Key pre-distribution: Preload keys into each sensor nodes before WSN
deployment.
B
S
E
C
F
D
K
G
{2, 3, 4, 5, 9}
{5, 7, 4, 9 1}
{3, 8, 1, 0 7}
{6 ,2, 8, 9 0}
{3 7, 9, 2, 4}
{5, 7, 4, 9 1}
{9, 2, 6, 3 1}
{1, 6, 4, 7 8}
Share key ?
Wireless Network Keys Management
WSN symmetric key establishment steps:2. Shared-key discovery: Setup connection between two sensor nodes in their
communication range by finding common shared key.
B
S
E
C
F
D
K
G
{2, 3, 4, 5, 9}
{5, 7, 4, 9 1}
{3, 8, 1, 0 7}
{6 ,2, 8, 9 0}
{3 7, 9, 2, 4}
{5, 7, 4, 8, 4}
{9, 2, 6, 3 1}
{1, 6, 4, 7 8}
Share key ?
Share
key ?
Shar
e ke
y ?Share
key ?
Share
key ?
Share
key ?
no !
Wireless Network Keys Management
WSN symmetric key establishment steps:
B
S
E
C
F
D
K
G
{2, 3, 4, 5, 9}
{5, 7, 4, 9 1}
{3, 8, 1, 0 7}
{6 ,2, 8, 9 0}
{3 7, 9, 2, 4}
{5, 7, 4, 8, 4}
{9, 2, 6, 3 1}
{1, 6, 4, 7 8}
Yes, 4,9
Yes 8
Yes 4,7
2. Shared-key discovery: Setup connection between two sensor nodes in their communication range by finding common shared key.
Yes 1,7
Wireless Network Keys Management
WSN symmetric key establishment steps:3. Path-key establishment : establishment of communication path and path
key between two unconnected sensor nodes.
B
S
E
C
F
D
K
G
{2, 3, 4, 5, 9}
{5, 7, 4, 9 1}
{3, 8, 1, 0 7}
{6 ,2, 8, 9 0}
{3 7, 9, 2, 4}
{5, 7, 4, 8, 4}
{9, 2, 6, 3 1}
{1, 6, 4, 7 8}
4, 5, 9
8
4, 7
1,7
Wireless Network Keys Management
WSN symmetric key establishment steps:
B
S
E
C
F
D
K
G
Key sb
Key be
Key bcKey SD
Key ef
Key fg
Key
gd
Key kd
Key
fk
3. Path-key establishment : establishment of communication path and path key between two unconnected sensor nodes.
Wireless Network Keys Management
WSN symmetric key establishment steps:1. Symmetric key establishment with Polynomial in finite field.
B
S
E
C
F
D
K
G
Id =7
I8 = 9
Id = 9 Id = 15
Id = 3
Id = 9
Id = 11
Id = 13
Wireless Network Keys Management
WSN symmetric key establishment steps:1. Symmetric key establishment with Polynomial in finite field.
B
S
E
C
F
D
K
G
Id =7
I8 = 9
Id = 9 Id = 15
Id = 3
Id = 9
Id = 11
Id = 13
What is
common ke
y ?
What is
common ke
y ?
Wireless Network Keys Management
WSN symmetric key establishment steps:
B
S
E
C
F
D
K
G
Id =7
I8 = 9
Id = 9 Id = 15
Id = 3
Id = 9
Id = 11
Id = 13
What is
common ke
y ?
22 3 yyxx
What is
common ke
y ?
1. Symmetric key establishment with Polynomial in finite field.
Wireless Network Keys Management
WSN symmetric key establishment steps:
B
S
E
C
F
D
K
G
Id =7
I8 = 9
Id = 9 Id = 15
Id = 3
Id = 9
Id = 11
Id = 13
What is
common ke
y ?
22 3 yxyx 22 3 yyxx
What is
common ke
y ?
4921737 222 yyyy
8127939 222 yyyy
1. Symmetric key establishment with Polynomial in finite field.
Wireless Network Keys Management
WSN symmetric key establishment steps:
22 3 yxyx 8127939 222 yyyy 8127939 222 yyyy1. Symmetric key establishment with Polynomial in finite field.
Each node can make security communication with other nodes in its communication range
Wireless Network Keys Management
Triple Key DistributionWhat is triple key distribution?
a common key discovery scheme among 3 sensor nodes
Y
X
Z
Common triple shared key
Y
X
Z
Common triple shared key
Wireless Network Keys Management
Triple Key Distribution
Why triple key distribution? path key establishment verifying the relayed message in path is authentic detect fault/malicious nodes
K{s, c, b}
BS C DKKey SC Key BKKey CB Key KD
secK secK secK secK
K{c, b, k}
K{b, k, d}
Wireless Network Keys Management
Triple Key Distribution
How triple key is distributed? any three full connected nodes share an unique common key any three string connected nodes share an unique common key
Two schemes:A.full connected triple keys distribution
B.String connected triple keys distribution
Wireless Network Keys Management
Triple Key Distribution (full connected triple nodes)
Triple nodes that share an unique triple key: BCS, BCE, ECK, EFK, FGK, DGK
Y
X
Z
Common triple shared key
B
S
E
C
F
D
K
G
Key sb
Key be
Key bcKey SD
Key ef
Key fg
Key
gd
Key kd
Key
fk
Key b
e
Key EK
Key KG
Key CS
Wireless Network Keys Management
Triple Key Application (full connected triple nodes)
K{s, e, c}
BS
E
C
F
DK
G
Key SC
Key
SE
Key CG
Key B
G
Key BKKey CB Key KD
Key
bc
Key
GK
Key EB
Key FD
Key E
C
Key F
K
secK secK secK secK
K{c, e, b}
K{b, f, k}
K{k, f, d}
K{c, b, g}
K{b, k, g}
C compare the message relayed by B to the sent message.Are they same? Yes? Done!No? Node B is in trouble, report!
Wireless Network Keys Management
Triple Key Distribution (String connected triple nodes)
B
S
E
C
F
D
K
G
Key sb
Key be
Key bcKey SD
Key ef
Key fg
Key
gd
Key kd
Key
fk
Key b
e
Triple nodes that share an unique triple key:SBE BCK CEF EFK FGD KDG EFGSBC BEF CKF ECK FKD CKD KFG
Y
X
Z
Common triple shared key
Wireless Network Keys Management
Triple Key Application (String connected triple nodes)
K{s, c, b}
BS C DKKey SC Key BKKey CB Key KD
secK secK secK secK
K{c, b, k}
K{b, k, d}
Wireless Network Keys Management
Triple Key Application (String connected triple nodes)
K{s, c, b}
BS C DKKey SC Key BKKey CB Key KD
secK secK secK secK
K{c, b, k}
K{b, k, d}
C: does node B correctly transfer my message to node K?
C compare the message relayed by B to the sent message.Are they same? Yes? Done!No? Node B is in trouble, report!
Wireless Network Keys Management
Analysis of triple key scheme
Security analysis:a compromised intermediate node possibly refuses or relay fake data frame. Because of acknowledge mechanism, its behaviour is monitored, found and kicked out of the network.
S Y DKey {?, S, Y}
Key {S, Y, D}
Key {S, Y, D}
Does node Y relay my message?No node Y stopped work, broadcast to whole WSNYes compare the relayed message. is the relayed message same as I sent?No node Y is compromised, broadcast to kick off Y
Wireless Network Keys Management
Several possible triple key establishment algorithms
Symmetrical polynomial for triple key computation
x, y, z are the ID of each node in the triple nodes
139999997 222222333 zyzxxzxyyzyxxyzzyx
X=10, y=11, z=12 85186
Wireless Network Keys Management
Triple key management in WSN?
a) A wireless sensor network with n nodes
b) The possibility for any two nodes to setup direct link is p
c) Possible average number of triple keys in each node S
full connected triple nodes3*
3P
nS
String connected triple nodes)1(**3
2 PPn
S
Wireless Network Keys Management
Triple key in cluster based network
Wireless Network Keys Management
Triple key in cluster based network
WSN network nodes density = DDeployment area = SCommunication radius = rCluster based WSN
Number of cluster headers
)*/(* 2rSCH C is a constant number , describes the WSN nodes deployment overlap level >1 Average nodes number in one cluster
2** rDn
Suppose the possibility of link between any two nodes in same cluster is P, we have:
Wireless Network Keys Management
Triple key in cluster based networkstring connected triple nodes
Average number of triple keys for each node
)1(*2
1P
nT
top related