21
Major Works on the Necessity and Implementations of PKC in WSNs Presented By: Vijay Soppadandi Pursuing M.Sc in Applied CS Semester: Third ID number: 21363273 1 Institute of Informatics Georg-August-Universitaet Goettingen, Germany Department of Telematics Proffesor : Dr. Dieter Hogrefe Supervisor: Dr. Parisa Memarmoshref Advisor : Hang Zhang Course: Security of Self-organizing Networks

Major works on the necessity and implementations ppt

Embed Size (px)

Citation preview

Major Works on the Necessity and

Implementations of PKC in WSNs

Presented By: Vijay Soppadandi

Pursuing M.Sc in Applied CS

Semester: Third

ID number: 21363273

1

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics

Proffesor : Dr. Dieter Hogrefe

Supervisor: Dr. Parisa Memarmoshref

Advisor : Hang Zhang

Course: Security of Self-organizing Networks

Wireless Sensors

2

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

o Low power electronic devices

o Integrated wireless communication

capabilities

Eg., Mica Mote:

Processor: 4Mhz

Memory: 128KB Flash and 4KB RAM

Radio: 916Mhz and 40Kbits/second.

Transmission range: 100 feet

Overview

Wireless sensor networks

WSNs security issues

Security threats and issues in WSNs

Goals of WSNs

PKC vs SKC

Advantages of PKC

How PKC works in WSNs

Cases for WSNs

Challenges

Types of implementations

Comparing different types of implementations

Recommendations

References

3

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Wireless Sensor Netwotks (WSNs)

4

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Gateway

network

Server: N/w &

Security manager

nodes

WSN Applications

• Environmental monitoring

War-fare, child education, surveillance, microsurgery and agriculture

• Smart buildings

Reduces the energy consumptions by controlling room temperature

• Hospital tracking systems

Tracking patients, doctors, drug administrators

5

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

WSN security

• Why do we care about security in WSN?

• Why previous security techniques are not

enough?

6

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Security threats and issues in WSN

• Security attacks are broadly classified into two categories

1) Passive Attacks

- Monitoring and Eavesdroping

- Comouflage Adversaries

2) Active Attacks

- Routing Attacks in Sensor Networks:

* Attacks on Information in transit

* Black hole / sink hole Attack

nodes

Base station

Attacker 7

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

B

Security threats and issues in WSN

• Wormholes Attacks

- Attacker records the packets at one location in N/W and tunnels those

to another location.

Attacker

Worm hole

Link

• Many others logical and physical attacks in WSNs

8

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

B Z

Y

Goals of WSNs

• Basic primary goals are:

- Data Confidentiality, Integrity, Authenticity and Availability (CIAA)

• Secounday goals are:

- Data freshnes: Needs to ensure the freshness of each message

- Self Organization: Sensor node be independent and flexible enough to be self-healing

- Secure Localization: Each and individual sensor must accurately automatically locate each

sensor in the network

9

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Basic comparission of PKC and SKC

PKC (Public Key Cryptography)

• Two different keys

• PKC was not preffered for low-resource contrained devices

• Energy inefficient, slow and computational complex

SKC ( Symmetric Key Cryptography)

• Similar keys

• It prefered for for low-resourse constrained devices

• Its not energy inefficient, slow and computational complex

10

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Advantages of PKC

• The primary advantage of PKC is increased security and

convenience

• It can provide digital signatures that cannot be repudiated

• PKC-based Key Distribution

-100% resilience

-100% connectivity

11

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

PKC in WSNs

• Two keys are generated

• Public key is open to all and private is belongs to owner

Ciphertext (C)

Base station (BS)12

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

EPUB(M)->C

M

Key generator

DPRI(C)->M

Memorysensor

Public key

(PUB)

Cases for WSNs

Complexity of key management and storage requirements in some

network settings:

- PKC allows flexiable key mangment

- Why not SKC? : Because of its complex broadcasting authentication

and delayed key disclosure

- A proper time synchronization

Absence of pairwise key

- nodes in N/W need to send their reading to Base station, If pair

wise keys are not exist.

- PKC is useful in this case

13

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Cases for WSNs

Offline processing and number of keys in some networks settings

- SKC needs to store a large amount keys in storage in sensor memories before their deployment

- It increases burden and often demands more storage

- Where as in PKC, public key of the BS is embedded into sensors

Scalability of a network

- PKC doesnt have scaliabilty problem

Better protection under physical capture scenario

- SKC has high probability of damage if the nodes use same secreat key

- PKC can be used to establish the symmetric session keys

14

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Challenges to implement PKC in WSNs

• Enegry consumption, communication costs, computational

complexity, time complexity, security

Major barriers to implement are:

Constrained resourse of the sensors:

Inadequate memory, processing and communication capabilities

not support excecute large amount of code

• Wireless medium:

Allows an attacker to easily intercept valid packets and inject

malicious ones

15

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Challenges to implement PKC in WSNs

• Hostile Environment:

This high hostile environment represents a serious

challange forsecurity researchers

16

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Types of Implementations

PKC-based mechanisms can be categorized mainly into

three approaches

a) Software implementations

b) Hardware implementations

c) Hardware/software blended implementations

17

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Comparing different types of implementations

18

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

Recommendations and future expectations

• Select the most suitable PK schemes based on the

topologies and the scenarios of WSN

• Next generation sensor nodes are expected to have more

energies

• Optimizing public-key protocols for sensor networks

19

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

References

Major Works on the Necessity and Implementations of PKC in

WSNs, author: AL-sakib Khan Pathan ,pp.525-545

Puccinelli, D., & Haenggi, M. (2005). Wireless sensor

networks: applications and challenges of ubiquitous sensing.

Circuits and Systems Magazine, IEEE, 5(3), 19-31.

Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless Sensor

Networks: Security Issues, Challenges and Solutions."

20

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks

END

21

Institute of Informatics Georg-August-Universitaet Goettingen, Germany

Department of Telematics Course: Security of Self-organizing Networks