Title: Securing Wireless Sensor Networks
1Securing Wireless Sensor Networks
- Wenliang (Kevin) Du
- Department of Electrical Engineering and Computer
Science - Syracuse University
2Overview
- Overview of Wireless Sensor Networks (WSN).
- Security in wireless sensor networks.
- Why is it different?
- Our work on key pre-distribution in WSN
- Deployment-based scheme (INFOCOM04)
- Pair-wise Scheme (ACM CCS03)
- Summary.
3Wireless Sensors
Berkeley Motes
4Mica Motes
- Mica Mote
- Processor 4Mhz
- Memory 128KB Flash and 4KB RAM
- Radio 916Mhz and 40Kbits/second.
- Transmission range 100 Feet
- TinyOS operating System small, open source and
energy efficient.
5Spec Motes
6Wireless Sensor Networks (WSN)
Sensors
7Applications of WSN
- Battle ground surveillance
- Enemy movement (tanks, soldiers, etc)
- Environmental monitoring
- Habitat monitoring
- Forrest fire monitoring
- Hospital tracking systems
- Tracking patients, doctors, drug administrators.
8Securing WSN
- Motivation why security?
- Why not use existing security mechanisms?
- WSN features that affect security.
- Our work
- Two key management schemes.
9Why Security?
- Protecting confidentiality, integrity, and
availability of the communications and
computations - Sensor networks are vulnerable to security
attacks due to the broadcast nature of
transmission - Sensor nodes can be physically captured or
destroyed
10Why Security is Different?
- Sensor Node Constraints
- Battery,
- CPU power,
- Memory.
- Networking Constraints and Features
- Wireless,
- Ad hoc,
- Unattended.
11Sensor Node Constraints
- Battery Power Constraints
- Computational Energy Consumption
- Crypto algorithms
- Public key vs. Symmetric key
- Communications Energy Consumption
- Exchange of keys, certificates, etc.
- Per-message additions (padding, signatures,
authentication tags)
12Constraints (Cont.)Public Key Encryption
- Slow
- 1000 times slower than symmetric encryption
- Hardware is complicated
- Energy consumption is high
Processor Energy Consumption (mJ/Kb) Energy Consumption (mJ/Kb) Energy Consumption (mJ/Kb)
Processor RSA/E/V RSA/D/S AES
MIPS R4000 0.81 16.7 0.00115
MC68328 42 840 0.0130
13Memory Constraints
- Program Storage and Working Memory
- Embedded OS, security functions (Flash)
- Working memory (RAM)
- Mica Motes
- 128KB Flash and 4KB RAM
14Objectives of Our Research
- Long-term Goals
- Study how WSNs constraints/features affect the
design of security mechanisms. - Develop security mechanisms for WSN.
- Current Projects
- Key Management Problems
- Data Fusion Assurance
15Key Management Problem
16Key Management Problem
Sensors
17Key Management Problem
Sensors
Secure Channels
18Approaches
- Trusted-Server Schemes
- Finding trusted servers is difficult.
- Public-Key Schemes
- Expensive and infeasible for sensors.
- Key Pre-distribution Schemes
19Key Pre-distribution
- Loading Keys into sensor nodes prior to
deployment - Two nodes find a common key between them after
deployment - Challenges
- Memory/Energy efficiency
- Security nodes can be compromised
- Scalability new nodes might be added later
20Naïve Solutions
- Master-Key Approach
- Memory efficient, but low security.
- Needs Tamper-Resistant Hardware.
- Pair-wise Key Approach
- N-1 keys for each node (e.g. N10,000).
- Security is perfect.
- Need a lot of memory and cannot add new nodes.
21Eschenauer-Gligor Scheme
Key Pool S
Each node randomly selects m keys
A
B
E
D
C
- When S 10,000, m75
- Pr (two nodes have a common key) 0.50
22Establishing Secure Channels
B
A
C
23Our Improvement Over Eschenauer-Gligor Scheme
Appeared in IEEE INFOCOM 2004
24Observations and Objectives
A
B
F
Property Pr(A, B) Pr(A, F)
Our objective Pr(A, B) gtgt Pr(A, F)
Using deployment knowledge
25Modeling Deployment Knowledge
Deployment points for a group of sensors
I
A
J
F
26Probability Distribution Function of Each
Deployment Group
27Key Pre-distribution Scheme
Key Pools
28Key Sharing Among Key Pools
Horizontal
a
B
C
A
b
b
a
F
D
a
a
Vertical
Diagonal
a
b
b
G
H
I
b
a
29Local Connectivity
30Network Resilience
- What is the damage when x nodes are compromised?
- These x nodes contain keys that are used by the
good nodes. - What percentage of communications can be affected?
31Network Resilience
32A Pairwise Key Pre-distribution Scheme
Appeared in CCS03 ACM Conference on Computer
and Communications Security
33Objectives
- Pairwise key pre-distribution scheme.
- Each pair of sensor share a unique secret key
- Can be used for Authentication
- Our Approach
- We use Blom Scheme to achieve Pairwise
- We use Random Key Selection scheme to improve
performance and resilience
34Blom Scheme
- Public matrix G
- Private matrix D (symmetric).
D
?1
?1
G
N
?1
Let A (D G)T
A G (D G)T G GT DT G GT D G (A G)T
35Blom Scheme
A (D G)T
G
(D G)T G
j
i
Kij
i
N
Kji
X
j
N
N
?1
36?-secure Property
i
j
k
Undesirable Situation if uG(i) vG(j) G(k)
then uA(i) vA(j) A(k)
G
?1
N
AT D G
i
j
k
37?-secure Property
- ANY ?1 columns in G are linear independent.
- Different from saying that G has rank ?1
- Rank there exist ?1 linear independent columns
- Can tolerate compromise up to ? nodes.
- Once ?1 nodes are compromised, the rest can be
calculated if these ?1 columns are linear
independent. - How to find such a matrix G?
38Vandermonde Matrix
1 1 1 1
s s2 s3 sN
s2 (s2)2 (s3)2 (sN)2
s? (s2)? (s3)? (sN)?
G
39Properties of Blom Scheme
- Bloms Scheme
- Network size is N
- Any pair of nodes can directly find a secret key
- Tolerate compromise up to ? nodes
- Need to store ?2 keys
- Challenge Can we increase ? without increasing
the storage usage.
40Multiple Space Scheme
Key-Space Pool
? spaces
(D1, G)
? spaces
? spaces
(D2, G)
Two nodes can find a pairwise key if they carry
a common key space!
(D?, G)
41How to select ? and ??
- If the memory usage is m, the security threshold
(probablistic) ?m is - To improve the security, we need to increase
?/?2. - However, such an increase affects the
connectivity.
42Measure Local Connectivity
plocal the probability that two neighboring
nodes can find a common key.
43Plocal for different ? and ?
44Security Analysis
- Network Resilience
- When x nodes are compromised, how many other
secure links are affected?
45Resilience (p 0.33, m200)
Blom
46Resilience (p 0.50, m 200)
Blom
47ImprovementUsing Two-hop Neighbors
? 7 ? 2
? 31 ? 2
48Summary
- Security in WSN is quite different from
traditional (Wired) network security. - We have proposed two key pre-distribution
schemes for WSN. - Our schemes substantially improves the
performance and network resilience.