P1252428389koQrU - PowerPoint PPT Presentation

1 / 1
About This Presentation
Title:

P1252428389koQrU

Description:

These keys provide flexibility in the application level security. ... Sensors will be preloaded with the first key of the hash chain. ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 2
Provided by: div120
Category:

less

Transcript and Presenter's Notes

Title: P1252428389koQrU


1
.Sense A Secure Framework for Sensor Network Data
Acquisition, Monitoring and Command
M. Salajegheh, H. Soroush, A. Thomos, T.
Dimitriou, I. Krontiris Algorithms and Security
Lab msal, hsor, ntom, tdim, ikro_at_ait.edu.gr
Architecture Overview
Abstract
.Sense is a distributed system which acts as a
tool for sensor network data acquisition and
command providing a transparent end-to-end
security service. .Sense was designed with the
following characteristics in mind
We present .Sense, an end-to-end security
framework for sensor network data acquisition,
monitoring and command. In order to provide
security service inside the sensor network two
security protocols are implemented. The first
protocol is a key establishment algorithm in
which sensor nodes agree on common keys to use
for securing communications among them. The
second is a scheme in which the base station is
able to issue commands in authenticated manner to
the network. We are also using typical security
schemes such as SSL to connect the end-users to
the system.
Security The system provides data integrity,
confidentiality and authentication.
Fault-tolerance The system handles potential
faults of its various components. Distributed
access to sensed information The system allows
concurrent access to sensed data according to
user privileges. Friendly GUI The system can be
easily used by non-advanced users. Scalability
It scales to thousands of sensor nodes. Supports
addition/revocation.
Advantages
Security Features
.Sense provides end-to-end security for the user.
For the security inside the sensor network we
have designed and implemented a security library
that can be wired and used by any other
application. Key Establishment Each Sensor node
establishes three kinds of keys a Node-Base key
that can be used for communication with the base
station, pair-wise keys for immediate
communication with neighbors and a group key that
allows secure one to many communications. These
keys provide flexibility in the application level
security. Encryption/Decryption For encryption
and decryption, we use Skipjack security
algorithm using CBC mode. In the base station of
the WSN, received encrypted messages are
decrypted before being sent to the UART port.
This leads to easier and more efficient
implementation. A new secure TOS Base had to be
implemented in order to achieve this
goal. Command Authentication We use hash chains
to authenticate commands. Sensors will be
preloaded with the first key of the hash chain.
When the base station needs to issue the next
command, it releases the next key of the hash
chain which sensors can check for authenticity.
  • First sensor network deployment with emphasis on
    fault-tolerance and end-to-end security.
  • Our generic library for security inside the
    sensor network can be used by other TinyOS
    programmers. It provides key establishment,
    encryption and decryption commands.
  • Two interfaces A web-based interface for users,
    showing real-time and history graphs and
    administrator interface showing network
    connectivity and allow issuing of commands and
    user management.
  • Database Resolution Apart from the sensor
    network sample rate, there are two more virtual
    sample rates. It increases the end user GUI
    performance.

Screenshots
End User GUI
Administrator GUI
Write a Comment
User Comments (0)
About PowerShow.com