wireless network keys management what is wsn ? steven du id: 3880740. csi 5148

28
Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Upload: shauna-cobb

Post on 19-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

What is WSN ?

Steven Du ID: 3880740. CSI 5148

Page 2: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Communication Security between sensor node

Because of memory and computation constraint in WSN

use symmetric keys for encryption and decryption sensors use common shared key to encrypt and

decrypt common shared keys are pre-distributed or

computed by specific scheme

The Globus Toolkit 4 Programmer's Tutorial Borja Sotomayor, University of Chicago, Department of Computer Science. Copyright © 2004, 2005 Borja Sotomayor

Page 3: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Key establishment schemes

Definition of key establishment:The algorithm or method for sensors to setup (or exchange) their common shared key for communication data

Main requirements on key establishment schemes:1. Availability : The network service is available without limitation with key

establishment 2. Authenticity: Ability for verifying that the message sent by a node is

authentic.3. Confidentiality : The key establishment technique should protect the

disclosure of data to unauthorized parties.4. Integrity : No falsification of data during transmission.

Key Pre-distribution in Wireless Sensor Networks when Sensors are within Communication Range Sushmita Ruj, Amiya Nayak and Ivan Stojmenovic

Page 4: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:1. Key pre-distribution: Preload keys into each sensor nodes before WSN

deployment. 2. Shared-key discovery: Setup connection between two sensor nodes in their

communication range by finding common shared key.3. Path-key establishment : establishment of communication path and path key

between two unconnected sensor nodes. Path: linked nodes chain between two nodes without direct connectionPath key: Common shared key used by the linked nodes in path to transfer message

B

S

E

C

F

D

K

G

Key sb

Key be

Key bcKey SD

Key ef

Key fg

Key

gd

Key kd

Key

fk

Page 5: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:1. Key pre-distribution: Preload keys into each sensor nodes before WSN

deployment.

B

S

E

C

F

D

K

G

{2, 3, 4, 5, 9}

{5, 7, 4, 9 1}

{3, 8, 1, 0 7}

{6 ,2, 8, 9 0}

{3 7, 9, 2, 4}

{5, 7, 4, 9 1}

{9, 2, 6, 3 1}

{1, 6, 4, 7 8}

Page 6: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Share key ?

Wireless Network Keys Management

WSN symmetric key establishment steps:2. Shared-key discovery: Setup connection between two sensor nodes in their

communication range by finding common shared key.

B

S

E

C

F

D

K

G

{2, 3, 4, 5, 9}

{5, 7, 4, 9 1}

{3, 8, 1, 0 7}

{6 ,2, 8, 9 0}

{3 7, 9, 2, 4}

{5, 7, 4, 8, 4}

{9, 2, 6, 3 1}

{1, 6, 4, 7 8}

Share key ?

Share

key ?

Shar

e ke

y ?Share

key ?

Share

key ?

Share

key ?

Page 7: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

no !

Wireless Network Keys Management

WSN symmetric key establishment steps:

B

S

E

C

F

D

K

G

{2, 3, 4, 5, 9}

{5, 7, 4, 9 1}

{3, 8, 1, 0 7}

{6 ,2, 8, 9 0}

{3 7, 9, 2, 4}

{5, 7, 4, 8, 4}

{9, 2, 6, 3 1}

{1, 6, 4, 7 8}

Yes, 4,9

Yes 8

Yes 4,7

2. Shared-key discovery: Setup connection between two sensor nodes in their communication range by finding common shared key.

Yes 1,7

Page 8: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:3. Path-key establishment : establishment of communication path and path

key between two unconnected sensor nodes.

B

S

E

C

F

D

K

G

{2, 3, 4, 5, 9}

{5, 7, 4, 9 1}

{3, 8, 1, 0 7}

{6 ,2, 8, 9 0}

{3 7, 9, 2, 4}

{5, 7, 4, 8, 4}

{9, 2, 6, 3 1}

{1, 6, 4, 7 8}

4, 5, 9

8

4, 7

1,7

Page 9: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:

B

S

E

C

F

D

K

G

Key sb

Key be

Key bcKey SD

Key ef

Key fg

Key

gd

Key kd

Key

fk

3. Path-key establishment : establishment of communication path and path key between two unconnected sensor nodes.

Page 10: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:1. Symmetric key establishment with Polynomial in finite field.

B

S

E

C

F

D

K

G

Id =7

I8 = 9

Id = 9 Id = 15

Id = 3

Id = 9

Id = 11

Id = 13

Page 11: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:1. Symmetric key establishment with Polynomial in finite field.

B

S

E

C

F

D

K

G

Id =7

I8 = 9

Id = 9 Id = 15

Id = 3

Id = 9

Id = 11

Id = 13

What is

common ke

y ?

What is

common ke

y ?

Page 12: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:

B

S

E

C

F

D

K

G

Id =7

I8 = 9

Id = 9 Id = 15

Id = 3

Id = 9

Id = 11

Id = 13

What is

common ke

y ?

22 3 yyxx

What is

common ke

y ?

1. Symmetric key establishment with Polynomial in finite field.

Page 13: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:

B

S

E

C

F

D

K

G

Id =7

I8 = 9

Id = 9 Id = 15

Id = 3

Id = 9

Id = 11

Id = 13

What is

common ke

y ?

22 3 yxyx 22 3 yyxx

What is

common ke

y ?

4921737 222 yyyy

8127939 222 yyyy

1. Symmetric key establishment with Polynomial in finite field.

Page 14: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

WSN symmetric key establishment steps:

22 3 yxyx 8127939 222 yyyy 8127939 222 yyyy1. Symmetric key establishment with Polynomial in finite field.

Each node can make security communication with other nodes in its communication range

Page 15: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key DistributionWhat is triple key distribution?

a common key discovery scheme among 3 sensor nodes

Y

X

Z

Common triple shared key

Y

X

Z

Common triple shared key

Page 16: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Distribution

Why triple key distribution? path key establishment verifying the relayed message in path is authentic detect fault/malicious nodes

K{s, c, b}

BS C DKKey SC Key BKKey CB Key KD

secK secK secK secK

K{c, b, k}

K{b, k, d}

Page 17: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Distribution

How triple key is distributed? any three full connected nodes share an unique common key any three string connected nodes share an unique common key

Two schemes:A.full connected triple keys distribution

B.String connected triple keys distribution

Page 18: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Distribution (full connected triple nodes)

Triple nodes that share an unique triple key: BCS, BCE, ECK, EFK, FGK, DGK

Y

X

Z

Common triple shared key

B

S

E

C

F

D

K

G

Key sb

Key be

Key bcKey SD

Key ef

Key fg

Key

gd

Key kd

Key

fk

Key b

e

Key EK

Key KG

Key CS

Page 19: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Application (full connected triple nodes)

K{s, e, c}

BS

E

C

F

DK

G

Key SC

Key

SE

Key CG

Key B

G

Key BKKey CB Key KD

Key

bc

Key

GK

Key EB

Key FD

Key E

C

Key F

K

secK secK secK secK

K{c, e, b}

K{b, f, k}

K{k, f, d}

K{c, b, g}

K{b, k, g}

C compare the message relayed by B to the sent message.Are they same? Yes? Done!No? Node B is in trouble, report!

Page 20: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Distribution (String connected triple nodes)

B

S

E

C

F

D

K

G

Key sb

Key be

Key bcKey SD

Key ef

Key fg

Key

gd

Key kd

Key

fk

Key b

e

Triple nodes that share an unique triple key:SBE BCK CEF EFK FGD KDG EFGSBC BEF CKF ECK FKD CKD KFG

Y

X

Z

Common triple shared key

Page 21: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Application (String connected triple nodes)

K{s, c, b}

BS C DKKey SC Key BKKey CB Key KD

secK secK secK secK

K{c, b, k}

K{b, k, d}

Page 22: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple Key Application (String connected triple nodes)

K{s, c, b}

BS C DKKey SC Key BKKey CB Key KD

secK secK secK secK

K{c, b, k}

K{b, k, d}

C: does node B correctly transfer my message to node K?

C compare the message relayed by B to the sent message.Are they same? Yes? Done!No? Node B is in trouble, report!

Page 23: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Analysis of triple key scheme

Security analysis:a compromised intermediate node possibly refuses or relay fake data frame. Because of acknowledge mechanism, its behaviour is monitored, found and kicked out of the network.

S Y DKey {?, S, Y}

Key {S, Y, D}

Key {S, Y, D}

Does node Y relay my message?No node Y stopped work, broadcast to whole WSNYes compare the relayed message. is the relayed message same as I sent?No node Y is compromised, broadcast to kick off Y

Page 24: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Several possible triple key establishment algorithms

Symmetrical polynomial for triple key computation

x, y, z are the ID of each node in the triple nodes

139999997 222222333 zyzxxzxyyzyxxyzzyx

X=10, y=11, z=12 85186

Page 25: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple key management in WSN?

a) A wireless sensor network with n nodes

b) The possibility for any two nodes to setup direct link is p

c) Possible average number of triple keys in each node S

full connected triple nodes3*

3P

nS

String connected triple nodes)1(**3

2 PPn

S

Page 26: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple key in cluster based network

Page 27: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple key in cluster based network

WSN network nodes density = DDeployment area = SCommunication radius = rCluster based WSN

Number of cluster headers

)*/(* 2rSCH C is a constant number , describes the WSN nodes deployment overlap level >1 Average nodes number in one cluster

2** rDn

Suppose the possibility of link between any two nodes in same cluster is P, we have:

Page 28: Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148

Wireless Network Keys Management

Triple key in cluster based networkstring connected triple nodes

Average number of triple keys for each node

)1(*2

1P

nT