key pre-distribution based secure backbone formation in wireless sensor networks

26
Key Pre-distribution Based Secure Backbone Formation in Wireless Sensor Networks Dilum Bandara 1 , Anura P. Jayasumana 1,2 , and Indrajit Ray 2 1 Department of Electrical and Computer Engineering, 2 Department of Computer Science, Colorado State University, CO 80523, USA. Supported in part by a grant from Army Research Office (ARO) [email protected]

Upload: colleen-murphy

Post on 31-Dec-2015

14 views

Category:

Documents


0 download

DESCRIPTION

Key Pre-distribution Based Secure Backbone Formation in Wireless Sensor Networks. Dilum Bandara 1 , Anura P. Jayasumana 1,2 , and Indrajit Ray 2 1 Department of Electrical and Computer Engineering, 2 Department of Computer Science, Colorado State University, CO 80523, USA. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Key Pre-distribution Based Secure Backbone Formation in

Wireless Sensor Networks

Dilum Bandara1, Anura P. Jayasumana1,2, and Indrajit Ray2

1Department of Electrical and Computer Engineering, 2Department of Computer Science,

Colorado State University, CO 80523, USA.

Supported in part by a grant from Army Research Office (ARO)

[email protected]

Page 2: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Outline Motivation

Key distribution in WSNs

Extended Generic Top-down Clustering algorithm

Performance analysis

Conclusions & future work

SenseApp 2008 2

Page 3: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Motivation Wireless Sensor Networks Virtual Sensor Networks

Perform different tasks Deployed in the same geographical region Involve dynamically varying subset of sensors nodes or users Better resource efficiency through collaboration and resource

sharing

SenseApp 2008 3

Page 4: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Why dedicated WSNs? Limited sensing,

processing and communication capabilities of the nodes

Severe power constraints

Cost

SenseApp 2008

Page 5: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Virtual Sensor Networks VSN – formed by a subset of

nodes dedicated to a certain task or an application

Other nodes in physical network provide support functions to create, maintain and operate the VSN

Multiple VSNs on a single WSN

Membership in VSN may be dynamic

Other Nodes

VSN-2 Nodes

VSN-1 Nodes

Jayasumana, Han, & Illangasekare, “Virtual Sensor Networks,” Proc. ITNG’07SenseApp 2008

Page 6: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Ex 1: Geographically overlapped applications

SenseApp 2008

Page 7: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Ex 2: Multi-functional sensor networks One physical sensor network for different

functions Each node equipped with multiple sensors Multiple applications

SenseApp 2008

Page 8: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

SmartKG iBadge platform (NESL/UCLA)

A. Savvides, Yale (ISPN/SPOTS 2005)

Page 9: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Ex 3: Dedicated applications There are some dedicated applications that will

benefit from the VSN concept as well

SenseApp 2008

Page 10: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Ex 3: Three-D plume tracking (TDTP)(CSU/COSM)

Spill

3-D Plume

SensorInstallationwells

Water table

Land surface

S-nodes

W-nodes

Jayasumana & Illangasekare, 2005SenseApp 2008

Page 11: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Other NodesVSN-2 NodesVSN-1 Nodes

S

Broadcast path from a node (S) in VSN2

Virtual Sensor Networks

Page 12: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Motivation Future collaborative/large-scale WSNs require some

structure Security and privacy becomes critical Secure backbone

Dynamic distribution of cryptographic keys Enhance secure upper layer functions

SenseApp 2008 13

Page 13: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Key distribution in WSNs Dynamic key assignment based on PKI is not practical ECC based key distribution – Du et al. (2007)

Use several resourceful nodes – form backbone Tamper proof nodes, location aware, geographic routing

Key assignment through a trusted base station - Shehab et al. (2005), Ibriq et al. (2007) High overhead, single point of failure

Key pre-distribution Random distribution – Eschenauer et al. (2002), Chan et al. (2003) Combinatorial design – Lee et al. (2005), Chakrabarti et al. (2006) Deployment knowledge based - Simonova et al. (2003), Du et al. (2004)

Cluster membership is meaningless if nodes don’t share at least one common key

SenseApp 2008 14

Page 14: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Generic Top-down Cluster & cluster tree formation (GTC) algorithm

C1

15SenseApp 2008

C2

C4

C3

C1

C7

C2

C4C6

C5

C3

1

4

3

2

98

76

5

C9

C10

C8

12

11

10

Page 15: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

GTC - Cluster tree formation Cluster tree is formed by keeping track of parent & child relationships

C1

C2

C4

C3

C1

C4C3C2

C10C8C7C6C5C9

16SenseApp 2008

Individual links are secured through shared keys

Page 16: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Extended GTC

SenseApp 2008 17

Form_Cluster(NIDCH, CID, delay, nCCHs, hopsmax, TTLmax, depth, keyIDsCH) 1 Wait(delay)2 TTL ← TTLmax

3 Bcast_Cluster(NIDCH, CID, hopsmax, TTLmax, TTL, depth, keyIDsCH)4 ack_list ← Receive_ACK(NIDchild, hops, p1, p2, keyIDschild,

timeoutACK)5 IF(ack_list = NULL)6 Join_Cluster()7 FOR i = 1 TO nCCHs

8 CCHi ← Select_Candidate_CHs(ack_list)9 CIDi ← Select_Next_CID(i)10 delayi ← Select_Delay(i)11 depthi ← depth + 112 Rqst_Form_Cluster(CCHi, CIDi, delayi, nCCH, hopsmax, TTLmax, depthi)

Join_Cluster()

13 Lstn_Bcast_Cluster(NIDCH, CID, hopsmax, TTLmax, TTL, depth, keyIDsCH)14 TTL ← TTL - 115 hops ← TTLmax – TTL16IF (hops ≤ hopsmax AND my_CID = 0)

17 IF(Common_Keys(my_keyIDs, keyIDsCH) ≠ NULL)18 my_CID ← CID 19 my_CH ← NIDCH

20 my_depth ← depth + 121 Send_ACK(my_NID, hops, p1, p2, my_keyIDs)22 IF(TTL > 0)23 Wait(Random(timebackoff)) 24 Fwd_Bcast_Cluster(NIDCH, CID, hopsmax, TTLmax, TTL, keyIDsCH)25 IF (hops ≤ hopsmax)26 Exit()27 ELSE28 IF(Common_Keys(my_keyIDs, keyIDsCH) ≠ NULL)29 IF(Wait_Lstn_Neighbors(Random(timebackoff)) = FALSE) 30 Send_ACK(my_NID, hops, p1, p2, my_keyIDs)31 IF(Lstn_Form_Cluster(CCH, CID, delay, nCCHs, hopsmax,

TTLmax, depth, timeoutCCH) = TRUE)32 Form_Cluster(my_NID, CID, delay, nCCHs, hopsmax, TTLmax,

depth, my_keyIDs)33 Exit() 34 Join_Cluster()

Form_Cluster(NIDCH, CID, delay, nCCHs, hopsmax, TTLmax, depth, keyIDsCH)

IF(Common_Keys(my_keyIDs, keyIDsCH) ≠ NULL)

Each Cluster Head (CH) broadcast its list of key IDs

Cluster members and candidate CHs respond only if they share a key(s)

If not, find a CH with a common key(s)

Intermediate nodes don’t need to have common a key(s)

Page 17: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Extended GTC (cont.) GTC algorithm is extended to form a secure cluster tree Provisioning for secure communication

Integral goal of the cluster formation process Reduced overhead and overall improvement in efficiency Ensure cluster tree is fully connected

Extended GTC algorithm Independent of the pre key-distribution scheme and network

topology No prior neighborhood information, location awareness, or time

synchronization Form uniform and circular clusters Control breadth and depth of the cluster tree

SenseApp 2008 18

Page 18: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Outline Motivation

Key distribution in WSNs

Extended Generic Top-down Clustering algorithm

Performance analysis

Conclusions & future work

SenseApp 2008 19

Page 19: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Performance analysis – Simulator 2 key pre-distribution schemes

Deployment Knowledge based Random key distribution (DKR)

Du, Deng, Han, Chen, and Varshney (2004) 120 keys per node and key pool of 100,000 Shares 4-5 keys with its neighbors

Random Block Merging in Combinatorial Design (RBMCD)

Chakrabarti, Maitra, and Roy (2006) 120 keys per node and key pool of 4,470 Shares 3-4 keys with its neighbors

SenseApp 2008 20

Page 20: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Simulator (cont.) Discrete event simulator was developed using C 5000 nodes in a circular region with a radius of 500m

2-D Gaussian based node distributed to facilitate DKR 100 samples, each with a different random seed Log-distance path-loss model with a fading factor of 2.2

SenseApp 2008 21

m

i iCHofrangetheinnodesofno

iclusterinnodesofno

myCircularit

1100

1

Page 21: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Performance analysis – Cluster characteristics

Neighborhood information improves cluster characteristics Lower local connectivity of RBMCD is affecting cluster

characteristics Circularity reduces with transmission range or density

SenseApp 2008 22

Transmission power (dBm)-20 -18 -16 -14 -12

Cir

cula

rity

40

45

50

55

60

65

70

75

80

85

HHCHHC + RBMCDHHC + DKRHHC + RBMCD-NeiHHC + DKR-NeiHexagonal

Transmission power (dBm)-20 -18 -16 -14 -12

Num

ber

of c

lust

ers

/CH

s

100

200

300

400

500

600

700

HHCHHC + RBMCDHHC + DKRHHC + RBMCD-NeiHHC + DKR-NeiHexagonal

Page 22: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Performance analysis – Backbone formation overhead

RBMCD - Lower local connectivity increases overhead Neighborhood information reduce overhead Key ID distribution mechanism has a significant impact

RBMCD – 1 key ID per group of keys (4 groups with 30 keys) DKR – 1 key ID per key (120 keys)

SenseApp 2008 23

Transmission power (dBm)-20 -18 -16 -14 -12

Nu

mb

er

of c

on

trol

me

ssa

ges

per

no

de

3.6

3.8

4.0

4.2

4.4

4.6

4.8

5.0

5.2

5.4

HHCHHC + RBMCDHHC + DKRHHC + RBMCD-NeiHHC + DKR-Nei

Transmission power (dBm)-20 -18 -16 -14 -12

Con

trol

mes

sage

ove

rhea

d pe

r no

de (

Byt

es)

0

200

400

600

800

1000

HHC + RBMCDHHC + DKRHHC + RBMCD - NeiHHC + DKR-Nei

Page 23: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Performance analysis – Backbone and compromised nodes

Direct impact of node compromise is not significant Indirect impact is significant

Depends on which node(s) got compromised Disasters, if occur closer to the root node – particularly in DKR

like schemes

SenseApp 2008 24

Number of compromized nodes

2 4 6 8 10

Num

ber

of c

lust

er h

eads

affe

cted

0

10

20

30

40

50

60

70

80 HHC + RBMCD - DirectHHC + RBMCD - IndirectHHC + DKR - DirectHHC + DKR - Indirect

Depth

0 2 4 6 8 10 12 14

Num

ber

of c

lust

er h

eads

0

10

20

30

40

50

60

70

HHCHHC + RBMCDHHC + DKRHHC + RBMCD-NeiHHC + DKR-NeiHexagonal

PT = -20dBmPT = -20dBm

Page 24: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Summary & future work Secure backbone formation is an integral part of GTC Facilitates secure key distribution and communication Independent of the key pre-distribution scheme

Better the local connectivity better the results Overhead is determined by key ID sharing mechanism

Algorithm retains most of the desirable characteristics, while building the secure backbone

Node compromise is a major issue in hierarchical WSNs

Future work More robust schemes for hierarchical WSNs Dynamic key distribution scheme for collaborative WSNs

SenseApp 2008 25

Page 25: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Questions ?

Thank You…

Page 26: Key Pre-distribution Based  Secure Backbone Formation in  Wireless Sensor Networks

Disconnected nodes

Generally 1-5% of the nodes are disconnected in GTC Due to random node placement, collisions during cluster formation phase, etc. Increase with transmission power Developed a 2-step cluster and tree optimization phase

Lower local connectivity of the key pre-distribution scheme can further disconnect nodes

SenseApp 2008 27

Transmission power (dBm)

-20 -18 -16 -14 -12

Num

ber

of d

isco

nnec

ted

nod

es (

%)

1

2

3

4

5

6

7

8

HHCHHC + RBMCDHHC + DKRHHC + RBMCD-NeiHHC + DKR-Nei