CSC 774 Advanced Network Security

Size: px
Start display at page:

Download "CSC 774 Advanced Network Security"

Transcription

1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g., aggregation) 3. Localization and time synchronization 4. Energy management, robustness,etc. 5. Security Node to node Communication and processing module sensor Node to sink Group communication Location? a. Key management b. Broadcast authentication c. Security of fundamental services d. Detection of attacks, etc. CSC 774 Adv. Net. Security Dr. Peng Ning 2 1

2 Wireless Sensor Networks (Cont d) Composed of Low cost, low power, and multifunctional nodes Wireless communication in short distances Sensor node Sensing Data processing Communication Unattended CSC 774 Adv. Net. Security Dr. Peng Ning 3 Security in Sensor Networks Sensor network security Key management Point-to-point authentication Encryption Broadcast authentication Secure localization Secure clock synchronization CSC 774 Adv. Net. Security Dr. Peng Ning 4 2

3 Challenges in Sensor Network Security Resource constraints Limited storage, computation, and communication Expensive mechanisms such as public key cryptography is not practical Depletable resources (e.g. battery power) Resource consumption attacks Threat of node compromises Sensor nodes are usually deployed in an unattended fashion Subject to node captures CSC 774 Adv. Net. Security Dr. Peng Ning 5 Challenges (Cont d) Local computation/communication v.s. global threat Sensor network applications often depend on local computation and communication due to resource constraints A determined attacker may Attack any node in a network, and Use information gathered from compromised nodes to attack non-compromised ones CSC 774 Adv. Net. Security Dr. Peng Ning 6 3

4 Research Problems Cryptographic services Broadcast authentication Key management Security mechanisms for fundamental services Clock synchronization Secure location discovery Secure aggregation and in-network processing Cluster formation/cluster head election CSC 774 Adv. Net. Security Dr. Peng Ning 7 Research Problems (Cont d) Securing sensor network applications Intruder detection Tracking of moving targets Intrusion detection A desirable component Require different solutions than traditional techniques Others CSC 774 Adv. Net. Security Dr. Peng Ning 8 4

5 CSC 774 Network Security Topic 9.1 Key Pre-distribution in Wireless Sensor Networks Dr. Peng Ning CSC 774 Adv. Net. Security 9 Establishing Pairwise Keys in Sensor Networks Traditional techniques are not practical in sensor networks Public cryptography: not practical Key distribution centers (KDC): not practical CSC 774 Adv. Net. Security Dr. Peng Ning 10 5

6 Probabilistic Key Pre-Distribution Dr. Peng Ning CSC 774 Adv. Net. Security 11 Probabilistic Key Pre-Distribution Basic idea Assign a random subset of keys of a key pool to each node Two nodes can establish secure communication if they have at least one common key i A set of random keys j CSC 774 Adv. Net. Security Dr. Peng Ning 12 6

7 Probabilistic Key Pre-Distribution (Cont d) Key distribution (three phases) Key pre-distribution Shared-key discovery Path-key establishment CSC 774 Adv. Net. Security Dr. Peng Ning 13 Probabilistic Key Pre-Distribution (Cont d) Key pre-distribution Generate a large pool of P keys and their ids For each sensor, random draw k keys out of P without replacement This forms the key ring of the sensor Load the key ring into the memory of the sensor Save the key ids of each key ring and the sensor id on a trusted controller For each node, load the i-th controller node with the key shared with that node. CSC 774 Adv. Net. Security Dr. Peng Ning 14 7

8 Probabilistic Key Pre-Distribution (Cont d) Key pre-distribution (Cont d) Parameters k and P are critical Only a small number of keys need to be placed on each node s key ring Any two nodes share at least a key with a chosen probability CSC 774 Adv. Net. Security Dr. Peng Ning 15 Probabilistic Key Pre-Distribution (Cont d) Shared-key discovery Each node discovers its neighbors in wireless communication range with which it shares keys Method 1: Each node broadcasts the list of key ids on its key ring Give an adversary additional knowledge of key distribution No direct ways to comprise keys CSC 774 Adv. Net. Security Dr. Peng Ning 16 8

9 Probabilistic Key Pre-Distribution (Cont d) Shared-key discovery (Cont d) Method 2 (private shared-key discovery) For each key on a key ring, each node broadcasts a list α, E Ki (α), i= 1,, k, where α is a challenge If a node receives this list, it tries to decrypt each ciphertext with every key it has The node establishes a shared key if it can successfully decrypt a cipher-text CSC 774 Adv. Net. Security Dr. Peng Ning 17 Probabilistic Key Pre-Distribution (Cont d) Path-key establishment Assign a path-key to selected pairs of nodes that Are in wireless communication range Do not share a common key But are connected by two or more links at the end of shared-key discovery Established through those links CSC 774 Adv. Net. Security Dr. Peng Ning 18 9

10 Probabilistic Key Pre-Distribution (Cont d) Revocation Revoke the entire key ring of a compromised node A controller node broadcasts a single revocation message containing a signed list of key ids for the revoked key ring The controller generates a signature key K e, and unicasts it to each node by encrypting it with the key they share. Each node verifies the signed list of key ids, and removes those key from its key ring CSC 774 Adv. Net. Security Dr. Peng Ning 19 Probabilistic Key Pre-Distribution (Cont d) Re-keying Restart shared-key discovery and path-key discovery CSC 774 Adv. Net. Security Dr. Peng Ning 20 10

11 Analysis Model a sensor network as a random graph All the sensor nodes are the vertices in the graph There is an edge between two vertices if the corresponding nodes share a common key Analysis questions What should be the expected degree (d) of a node so that a sensor network with n nodes is connected? Given d and the size of a neighborhood (n ), what should be the key ring size (k) and key pool size (P) for a network with n nodes? CSC 774 Adv. Net. Security Dr. Peng Ning 21 Analysis (Cont d) What should be the expected degree (d) of a node so that a sensor network with n nodes is connected? Answered by random graph theory G(n, p): a graph of n nodes for which the probability that a link exists between two nodes is p. d = p * (n-1): expected degree of a node (i.e. the average number of edges connecting that node with its neighbors). Erdös and Rényi s Equation: Given a desired probability P c for graph connectivity and number of nodes, n, the threshold function p is defined by: where P c = limpr[g(n, p) is connect] = e $e $ c n "# p = ln(n) n + c and c is any real constant. n CSC 774 Adv. Net. Security Dr. Peng Ning 22 11

12 Analysis (Cont d) CSC 774 Adv. Net. Security Dr. Peng Ning 23 Analysis (Cont d) Given d and the size of a neighborhood (n ), what should be the key ring size (k) and key pool size (P) for a network with n nodes? p : probability of sharing a key between any two nodes in a neighborhood (p =d/(n -1)) p = 1 Pr[two nodes do not share any key] ((P " k)!)2 p'=1" (P " 2k)!P! Simplify with Stirling s approximation n!" 2# n n e $n (1" k + 1 p )2(P"k 2 ) p'=1" (1" 2k ) (P"2k ) p CSC 774 Adv. Net. Security Dr. Peng Ning 24 12

13 Analysis (Cont d) CSC 774 Adv. Net. Security Dr. Peng Ning 25 Improvements for the Probabilistic Key Pre-Distribution q-composite key pre-distribution Two nodes have to have at least q shared keys to derive a valid pairwise key Better resilience when the number of compromised nodes is small Multi-path enforcement Derive each path key through multiple nodedisjoint paths, each of which derives one sub-key Path key is the XOR of all sub keys Better resilience to compromised nodes in key paths CSC 774 Adv. Net. Security Dr. Peng Ning 26 13

14 Random Pairwise Keys Scheme Approach Calculate the smallest probability p of two nodes being connected so that the entire network is connected with a high probability. Consider a network of n nodes Each node needs to store np pairwise keys Limitation The network size is limited by n=m/p, where m is the available memory on each node for keys CSC 774 Adv. Net. Security Dr. Peng Ning 27 Polynomial Pool Based Key Pre-Distribution Dr. Peng Ning CSC 774 Adv. Net. Security 28 14

15 Outline Background Polynomial based key predistribution A framework for key predistribution in sensor networks Polynomial pool based key predistribution Two efficient key predistribution schemes Random subset assignment Grid based key predistribution Efficient implementation in sensor networks Conclusion and future work CSC 774 Adv. Net. Security Dr. Peng Ning 29 Polynomial Based Key Predistribution By Blundo et al. [CRYPTO 92] Developed for group key predistribution We consider the special case of pairwise key predistribution Predistribution: t The setup server randomly generates f (x, y) = " a ij x i y j, i, j= 0 where f (x,y) = f (y, x) Each sensor i is given a polynomial share f(i, y) Key establishment: Node i computes f (i, y = j) = f (i, j) Node j computes f (j, y =i) = f (j, i) = f (i, j) CSC 774 Adv. Net. Security Dr. Peng Ning 30 15

16 Polynomial Based Key Predistribution (Cont d) Security properties (by Blundo et al.) Unconditionally secure for up to t compromised nodes Performance Storage overhead at sensors: (t +1)log q bits Computational overhead at sensors: t modular multiplications and t modular additions No communication overhead Limitation Insecure when more than t sensors are compromised An invitation for node compromise attacks CSC 774 Adv. Net. Security Dr. Peng Ning 31 Polynomial Pool Based Key Predistribution A general framework for key predistribution based on bivariate polynomials Let us use multiple polynomials A pool of randomly generated bivariate polynomials Two special cases One polynomial in the polynomial pool Polynomial based key predistribution All polynomials are 0-degree ones Key pool by Eschenauer and Gligor CSC 774 Adv. Net. Security Dr. Peng Ning 32 16

17 Polynomial Pool Based Key Predistribution (Cont d) Phase 1: Setup Randomly generates a set F of bivariate t-degree polynomials Subset assignment: Assign a subset of polynomials in F to each sensor A subset: {f j (i, y),, f k (i, y)} f 1 (x,y), f 2 (x,y),, f n (x,y) i Random polynomial pool F CSC 774 Adv. Net. Security Dr. Peng Ning 33 Polynomial Pool Based Key Predistribution (Cont d) Phase 2: Direct Key Establishment Polynomial share discovery: Communicating sensors discover if they share a common polynomial Pairwise keys can be derived if they share a common polynomial. Two approaches: Predistribution: Given predistributed information, a sensor can decide if it can establish a direct pairwise key with another sensor. Real-time discovery: Sensors discover on the fly if they can establish a direct pairwise key. CSC 774 Adv. Net. Security Dr. Peng Ning 34 17

18 Polynomial Pool Based Key Predistribution (Cont d) Phase 3: Path Key Establishment Establish pairwise keys through other sensors if two sensors cannot establish a common key directly Path discovery Node i finds a sequence of nodes between itself and node j such that two adjacent nodes can establish a key directly Key path: the above sequence of nodes between i and j Two approaches Predistribution Node i can find a key path to node j based on predistributed information Real-time discovery Node i discover a key path to node j on the fly CSC 774 Adv. Net. Security Dr. Peng Ning 35 Random Subset Assignment Scheme An instantiation of the polynomial pool-based key predistribution. Subset assignment: random A random subset: {f j (i, y),, f k (i, y)} f 1 (x,y), f 2 (x,y),, f n (x,y) i Random polynomial pool F CSC 774 Adv. Net. Security Dr. Peng Ning 36 18

19 Random Subset Assignment (Cont d) Polynomial share discovery Real-time discovery Broadcast IDs in clear text. Broadcast a list of challenges. i f j,, f k i α, E kv (α), v = 1,, m. CSC 774 Adv. Net. Security Dr. Peng Ning 37 Random Subset Assignment (Cont d) Path discovery i and j use k as a KDC Alternatively, i contacts nodes with which it shares a key; any node that also shares a key with j replies. Each key path has 2 hops i j k CSC 774 Adv. Net. Security Dr. Peng Ning 38 19

20 Probability of Sharing Direct Keys between Sensors s'=2 s'=3 s'=4 s'= p s s: polynomial pool size s : number of polynomial shares for each sensor p: probability of sharing a polynomial between two sensors CSC 774 Adv. Net. Security Dr. Peng Ning 39 Probability of Sharing Keys between Sensors d=20 d=40 d=60 d=80 d= Ps d: number of neighbors p: probability that two sensors share a polynomial p s : probability of sharing a common key Note: each key path is at most two hops p CSC 774 Adv. Net. Security Dr. Peng Ning 40 20

21 Dealing with Compromised Sensors Comparison with basic probability and q-composite schemes Probability to establish direct keys p = 0.33 Each sensor has storage equivalent to 200 keys Fraction of compromised links between noncompromised sensors RS(s'=2,s=11,t=99) RS(s'=3,s=25,t=66) RS(s'=4,s=43,t=49) q-composite(q=1) q composite(q=2) q composite(q=3) Basic probabilistic Number of compromised nodes CSC 774 Adv. Net. Security Dr. Peng Ning 41 Dealing with Compromised Sensors (Cont d) Comparison with random pairwise keys scheme Assume perfect security against node compromises Each polynomial is used at most t times in our scheme Each sensor has storage equivalent to 200 keys RS(s'=2,t=99) RS(s'=6,t=32) RS(s'=10,t=19) Random pairwise keys Probability of sharing a common key Maximum supported network size CSC 774 Adv. Net. Security Dr. Peng Ning 42 21

22 Grid Based Key Predistribution Create a m m grid Each row or column is assigned a polynomial Assign each sensor to an interaction Assign each sensor the polynomials for the row and the column of its intersection Sensor ID: coordinate There are multiple ways for any two sensors to establish a pairwise key CSC 774 Adv. Net. Security Dr. Peng Ning 43 Grid Based Key Predistribution (Cont d) Order of node assignment CSC 774 Adv. Net. Security Dr. Peng Ning 44 22

23 Grid Based Key Predistribution (Cont d) Polynomial share discovery No communication overhead Same column Same row CSC 774 Adv. Net. Security Dr. Peng Ning 45 Grid Key Predistribution (Cont d) Path discovery Real-time discovery Paths with one intermediate node Paths with two intermediate nodes They know who to contact! CSC 774 Adv. Net. Security Dr. Peng Ning 46 23

24 Properties 1. Any two sensors can establish a pairwise key when there is no compromised node; 2. Even if some sensors are compromised, there is still a high probability to establish a pairwise key between non-compromised sensors; 3. A sensor can directly determine whether it can establish a pairwise key with another node. CSC 774 Adv. Net. Security Dr. Peng Ning 47 Dealing with Compromised Sensors Comparison with basic probabilistic scheme, q-composite scheme, and random subset assignment scheme Assume each sensor has storage equivalent to 200 keys Fraction of compromised links between non-compromised sensors Basic probabilistic(p=0.014) q-composite(q=1,p=0.014) RS(s'=2,s=287,t=99,p=0.014) Grid-based(N=20000,p=0.014) Number of compromised nodes Basic probabilistic(p=0.33) q-composite(q=1,p=0.33) RS(s'=2,s=11,t=99,p=0.33) CSC 774 Adv. Net. Security Dr. Peng Ning 48 24

25 Dealing with Compromised Sensors (Cont d) Probability to establish pairwise keys when there are compromised sensors d: number of non-compromised sensors to contact Assume each sensor has storage equivalent to 200 keys d=1 d=3 d=5 d=7 d=9 Probability to establish pairwise keys Fraction of compromised nodes CSC 774 Adv. Net. Security Dr. Peng Ning 49 Implementation Observations Sensor IDs are chosen from a field much smaller than cryptographic keys Field for cryptographic keys: F q Field for sensor IDs: F q Special fields: q = , q = No division operation is needed for modular multiplications Key: n bits l bits each f 1 (i,y) f 2 (i,y) f r (i,y) Polynomials over F q Same storage as 1 Sensor ID j polynomial over F q CSC 774 Adv. Net. Security Dr. Peng Ning 50 25

26 Implementation (Cont d) Lemma 1. In this implementation, the entropy of the key for a coalition of no more than t other sensors is 2l +1 r " [log 2 q'#(2 # )] q' " where l = " log 2 q' # and r = n $ #. l % Examples 64 bit keys When q = , the above entropy is bits When q = , the above entropy is bits CSC 774 Adv. Net. Security Dr. Peng Ning 51 TinyKeyMan Polynomial pool based key pre-distribution on TinyOS CSC 774 Adv. Net. Security Dr. Peng Ning 52 26

Establishing Pairwise Keys in Distributed Sensor Networks

Establishing Pairwise Keys in Distributed Sensor Networks Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh NC 7695-87 dliu@unity.ncsu.edu Peng

More information

A Key-Management Scheme for Distributed Sensor Networks

A Key-Management Scheme for Distributed Sensor Networks A Key-Management Scheme for Distributed Sensor Networks Stratimir Doichev April 23, 2003 CSC 774 Network Security 1 Paper Overview A Key-Management Scheme for Distributed Sensor Networks, Laurent Eschenauer,

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Location-Based Pairwise Key Establishments for Static Sensor Networks

Location-Based Pairwise Key Establishments for Static Sensor Networks Location-Based Pairwise Key Establishments for Static Sensor Networks Donggang Liu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC 27695-827 dliu@ncsu.edu

More information

Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks

Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks DONGGANG LIU and PENG NING North Carolina State University Pairwise key establishment is a fundamental security service

More information

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * SCOE, Pune University Prof. J. B. Kulkarni SCOE, Pune University Abstract Security is the main issue while setting

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security CSC 774 Advanced Network Security Topic 5 Group Key Management Dr. Peng Ning CSC 774 Adv. Net. Security 1 Group Communication A group consists of multiple members Messages sent by one sender are received

More information

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,

More information

A Time-Based Key Management Protocol for Wireless Sensor Networks

A Time-Based Key Management Protocol for Wireless Sensor Networks A Time-Based Key Management Protocol for Wireless Sensor Networks Jiyong Jang 1, Taekyoung Kwon 2, and Jooseok Song 1 1 Department of Computer Science, Yonsei University {souljang, jssong}@emerald.yonsei.ac.kr.

More information

Abstract. 1. Introduction

Abstract. 1. Introduction SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 20, 2011 Class #4 Broadcast information security Agenda Broadcast information security Broadcast authentication and encryption Key management

More information

By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili

By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili W. Du, J. Deng, Y. S. Han, P. K. Varshney,

More information

See discussions, stats, and author profiles for this publication at:

See discussions, stats, and author profiles for this publication at: See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/66083307 Application-specific hybrid symmetric design of key pre-distribution for wireless

More information

A Security Infrastructure for Trusted Devices

A Security Infrastructure for Trusted Devices Infrastructure () A Security Infrastructure for Trusted Devices Mahalingam Ramkumar Mississippi State University, MS Nasir Memon Polytechnic University, Brooklyn, NY January 31, 2005 Infrastructure ()

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 3.3: Security Handshake Pitfalls CSC 474/574 Dr. Peng Ning 1 Authentication Handshakes Secure communication almost always includes an initial authentication

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

WIRELESS sensor networks have received a lot of attention

WIRELESS sensor networks have received a lot of attention IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

AS with all networks comprising geographically distributed

AS with all networks comprising geographically distributed IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2005 233 On the Distribution and Revocation of Cryptographic Keys in Sensor Networks Haowen Chan, Virgil D. Gligor, Adrian

More information

An overview of Trust, Naming and Addressing and Establishment of security associations

An overview of Trust, Naming and Addressing and Establishment of security associations Security and Cooperation in Wireless Networks Georg-August University Göttingen An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models;

More information

Reconfigurable Feedback Shift Register Cipher Design and Secure Link Layer Protocol for Wireless Sensor Network

Reconfigurable Feedback Shift Register Cipher Design and Secure Link Layer Protocol for Wireless Sensor Network Reconfigurable Feedback Shift Register Cipher Design and Secure Link Layer Protocol for Wireless Sensor Network by Guang Zeng B.Sc., Beijing University of Posts and Telecommunications, 2011 A Thesis Submitted

More information

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu 1 Sanjeev Setia 1 Sushil Jajodia 1,2 1 Center for Secure Information Systems George Mason

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks WENLIANG DU Syracuse University JING DENG University of New Orleans YUNGHSIANG S. HAN National Taipei University, Taiwan PRAMOD K. VARSHNEY

More information

Secure Multi-Hop Infrastructure Access

Secure Multi-Hop Infrastructure Access Secure Multi-Hop Infrastructure Access presented by Reza Curtmola (joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens) 600.647 Advanced Topics in Wireless Networks Wireless Infrastructure

More information

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLICATION ATTACKS USING MUTUAL AUTHENTICATION SCHEME Linciya.T 1 and Anandkumar. K.M 2 1 P.G Scholar, Department of Computer Science

More information

A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks

A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks A Set-Covering Approach for Modeling Attacks on Key redistribution in Wireless Sensor Networks atrick Tague Network Security Lab NSL) Dept. of Electrical Engineering University of Washington Seattle, Washington,

More information

Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications

Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications 1 Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications Sushmita Ruj, Member, IEEE, Amiya Nayak, Senior Member, IEEE and Ivan Stojmenovic, Fellow, IEEE SEECS, University of

More information

An Efficient Key Management Scheme for Heterogeneous Sensor Networks

An Efficient Key Management Scheme for Heterogeneous Sensor Networks An Efficient Key Management Scheme for Heterogeneous Sensor Networks S.Gandhi,D.Indira Department of Computer Science and Engineering Gudlavalleru Engineering College Gudlavalleru 521356 Abstract Previous

More information

Random Key Predistribution Schemes for Sensor Networks 1

Random Key Predistribution Schemes for Sensor Networks 1 Random Key Predistribution Schemes for Sensor Networks 1 Haowen Chan Adrian Perrig Dawn Song 21 April 2003 CMU-CS-02-207 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Abstract

More information

Public-Key Cryptography

Public-Key Cryptography Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.

More information

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Abstract Accurate and synchronized time is crucial in many sensor network applications Time synchronization becomes an attractive target due to its importance

More information

HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks

HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks Boushra Maala and Yacine Challal and Abdelmadjid Bouabdallah Universite de Technologie de Compiegne, UMR CNRS 6599

More information

SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS SAMIR GOKHALE. Bachelor of Engineering DAVV. Indore, India

SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS SAMIR GOKHALE. Bachelor of Engineering DAVV. Indore, India SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS BY SAMIR GOKHALE Bachelor of Engineering DAVV Indore, India 2002 Submitted to the faculty of the Graduate College of the Oklahoma State University in partial

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks WENLIANG DU and JING DENG Syracuse University YUNGHSIANG S. HAN National Chi Nan University, Taiwan PRAMOD K. VARSHNEY Syracuse University

More information

Study on Dynamic Key Management of Clustered Sensor Networks

Study on Dynamic Key Management of Clustered Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.6, June 006 45 Study on Dynamic Key Management of Clustered Sensor Networks Huanzhao Wang, Dongwei Luo, Feifei Chen and Zengzhi

More information

WIRELESS sensor networks (WSNs) have been

WIRELESS sensor networks (WSNs) have been IEEE SENSORS JOURNAL, VOL. 15, NO. 9, SEPTEMBER 2015 5103 Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Lein Harn and Ching-Fang Hsu Abstract Special designs are needed

More information

An Online Threshold Key Distribution Scheme for Symmetric Key Management

An Online Threshold Key Distribution Scheme for Symmetric Key Management An Online Threshold Key Distribution Scheme for Symmetric Key Management Alireza T. Boloorchi, M. H. Samadzadeh, and T. Chen Computer Science Department, Oklahoma State University Stillwater, OK, USA Abstract

More information

Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..914 RESEARCH ARTICLE Key Predistribution Scheme for Clustered Hierarchical

More information

Security in Sensor and Ad-Hoc Networks

Security in Sensor and Ad-Hoc Networks Security in Sensor and Ad-Hoc Networks Virgil D. Gligor gligor@umd.edu Electrical and Computer Engineering Department University of Maryland College Park, Maryland 20742 FOSAD 2004 Bertinoro, Italy September

More information

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 2 A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang Kevin

More information

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks Firdous Kausar 1, Sajid Hussain 2,Tai-hoonKim 3, and Ashraf Masood 1 1 College of Signals, NUST, Rawalpindi, Pakistan firdous.imam@gmail.com,

More information

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Forward-secure Key Evolution in Wireless Sensor Networks

Forward-secure Key Evolution in Wireless Sensor Networks Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski 1 Mirosław Kutyłowski 1 Michał Ren 2 Katarzyna Rybarczyk 2 1 Wrocław University of Technology Wrocław, Poland 2 Adam Mickiewicz

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Lecture IV : Cryptography, Fundamentals

Lecture IV : Cryptography, Fundamentals Lecture IV : Cryptography, Fundamentals Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University Spring 2012 Basic Principles

More information

A Group-oriented Access Control Scheme for P2P Networks 1

A Group-oriented Access Control Scheme for P2P Networks 1 I.J. Wireless and Microwave Technologies, 2011, 1, 30-37 Published Online February 2011 in MECS (http://www.mecs-press.net DOI: 10.5815/ijwmt.2011.01.05 Available online at http://www.mecs-press.net/ijwmt

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks

A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks Mandicou Ba, Ibrahima Niang, Bamba Gueye Département de Mathématiques et Informatique Université Cheikh Anta Diop Dakar,

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan

More information

Providing Transparent Security Services to Sensor Networks

Providing Transparent Security Services to Sensor Networks 1 Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou Athens Information Technology Email: {hsor,msal,tdim}@ait.edu.gr Abstract In this paper

More information

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 24 A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang

More information

SECURITY has been drawing wide interest in the area of

SECURITY has been drawing wide interest in the area of IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 9, SEPTEMBER 007 1009 A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, and Yuguang Fang, Senior Member,

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;

More information

Key Management for Static Wireless Sensor Networks With Node Adding

Key Management for Static Wireless Sensor Networks With Node Adding IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014 1133 Key Management for Static Wireless Sensor Networks With Node Adding Filippo Gandino, Member, IEEE, Bartolomeo Montrucchio, Member,

More information

Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network

Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network Saif Al-Alak Department of Computer Science, College of Science for Women, University of Babylon, Iraq. Abstract Wireless Sensor

More information

STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS

STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS Soumyasri S M 1, Dr. Rajkiran Ballal 2 and Ramakrishna Hegde 3 1,2 Computer Science, SDM College, Ujire, Electrical & Electronics,

More information

Multicast Security. a multicast network is a network of users in which it is possible to send messages simultanously to all of the users

Multicast Security. a multicast network is a network of users in which it is possible to send messages simultanously to all of the users Multicast Security a multicast message is a message that has many designated receivers, i.e., one-to-many communication as opposed to one-to-one communication a multicast network is a network of users

More information

A General Probabilistic Model for Improving Key Assignment in Wireless Networks

A General Probabilistic Model for Improving Key Assignment in Wireless Networks A General Probabilistic Model for Improving Key Assignment in Wireless etworks Patrick Tague and Radha Poovendran etwork Security Lab (SL, Department of Electrical Engineering University of Washington,

More information

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks Sensors 21, 1, 1251-1278; doi:1.339/s121251 OPEN ACCESS sensors ISSN 1424-822 www.mdpi.com/journal/sensors Article Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks Ching-Tsung Hsueh,

More information

Armor-LEACH for Wireless Sensor Network

Armor-LEACH for Wireless Sensor Network Armor-LEACH for Wireless Sensor Network M.A. Abuhelaleh T. M. Mismar A. A. Abuzneid School of Engineering, University of Bridgeport Bridgeport, CT 06604 {mabuhela, tmismar, abuzneid} @bridgeport.edu Abstract

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially

More information

MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks

MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks International Journal of Network Security, Vol.15, No.1, PP.241-252, Jan. 2013 241 MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks Dulal Kar 1, Rashad Tatum 2, and Keith Zejdlik

More information

Post-Quantum Cryptography A Collective Challenge

Post-Quantum Cryptography A Collective Challenge Post-Quantum Cryptography A Collective Challenge Christophe Petit University of Oxford Mathematical Institute Christophe Petit -Oxford Crypto Day 1 Cryptography is very useful Cryptography is the science

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 8, August 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security Chapter I INTRODUCTION This thesis provides an introduction to wireless sensor network [47-51], their history and potential, previous deployments and engineering issues that concern them, and the security

More information

CIS 6930/4930 Computer and Network Security. Topic 3.2 Secret Key Cryptography Modes of Operation

CIS 6930/4930 Computer and Network Security. Topic 3.2 Secret Key Cryptography Modes of Operation CIS 6930/4930 Computer and Network Security Topic 3.2 Secret Key Cryptography Modes of Operation 1 Cipher Feedback Mode (CFB) IV Key 64 64 64 64 64 M 1 M 2 M 3 M 4 64 64 64 46 + padding 64 64 64 64 C 1

More information

Energy-rate based MAC protocol for wireless sensor networks and key pre-distribution schemes

Energy-rate based MAC protocol for wireless sensor networks and key pre-distribution schemes Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2005 Energy-rate based MAC protocol for wireless sensor networks and key pre-distribution schemes Ramaraju Kalidindi Louisiana

More information

CS 395T. Formal Model for Secure Key Exchange

CS 395T. Formal Model for Secure Key Exchange CS 395T Formal Model for Secure Key Exchange Main Idea: Compositionality Protocols don t run in a vacuum Security protocols are typically used as building blocks in a larger secure system For example,

More information

Chapter 10 : Private-Key Management and the Public-Key Revolution

Chapter 10 : Private-Key Management and the Public-Key Revolution COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 10 : Private-Key Management and the Public-Key Revolution 1 Chapter 10 Private-Key Management

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Chord-based Key Establishment Schemes for Sensor Networks

Chord-based Key Establishment Schemes for Sensor Networks Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because

More information

Authentication Handshakes

Authentication Handshakes AIT 682: Network and Systems Security Topic 6.2 Authentication Protocols Instructor: Dr. Kun Sun Authentication Handshakes Secure communication almost always includes an initial authentication handshake.

More information

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Survey on Wireless Sensor Network for Message Authentication and Source Privacy Survey on Wireless Sensor Network for Message Authentication and Source Privacy Vaishali Kisanrao Gulhane 1, S. N. Shelke 2 Computer Engineering, Sinhgad Academy of Engineering, Kondhwa, Pune. Professor,

More information

Other Topics in Cryptography. Truong Tuan Anh

Other Topics in Cryptography. Truong Tuan Anh Other Topics in Cryptography Truong Tuan Anh 2 Outline Public-key cryptosystem Cryptographic hash functions Signature schemes Public-Key Cryptography Truong Tuan Anh CSE-HCMUT 4 Outline Public-key cryptosystem

More information

A Joint Performance-Vulnerability Metric Framework for Designing Ad Hoc Routing Protocols

A Joint Performance-Vulnerability Metric Framework for Designing Ad Hoc Routing Protocols The 2010 Military Communications Conference - Unclassified rogram - Cyber Security and Network Management A Joint erformance-vulnerability Metric Framework for Designing Ad Hoc Routing rotocols Andrew

More information

Public Key Encryption. Modified by: Dr. Ramzi Saifan

Public Key Encryption. Modified by: Dr. Ramzi Saifan Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number

More information

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks 2009 International Conference on Computational Science and Engineering Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks Sushmita Ruj Applied Statistics Unit, Indian Statistical

More information

Design of an Architecture for Multiple Security Levels in Wireless Sensor Networks

Design of an Architecture for Multiple Security Levels in Wireless Sensor Networks Design of an Architecture for Multiple Security Levels in Wireless Sensor Networks Jongdeog Lee Department of Information Science Korea Military Academy Seoul, Korea dlwhdejrl@gmail.com Sang H. Son Department

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System

More information

I R TECHNICAL RESEARCH REPORT. Key Establishment in Heterogeneous Self-Organized Networks. by Gelareh Taban, Rei Safavi-Naini TR

I R TECHNICAL RESEARCH REPORT. Key Establishment in Heterogeneous Self-Organized Networks. by Gelareh Taban, Rei Safavi-Naini TR TECHNICAL RESEARCH REPORT Key Establishment in Heterogeneous Self-Organized Networks by Gelareh Taban, Rei Safavi-Naini TR 2007-6 I R INSTITUTE FOR SYSTEMS RESEARCH ISR develops, applies and teaches advanced

More information

A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption

A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption Hu Shuaiqi School of Information Science and Engineering Southeast University Nanjing, China shuaiqihu@yahoo.com

More information

Distributed ID-based Signature Using Tamper-Resistant Module

Distributed ID-based Signature Using Tamper-Resistant Module , pp.13-18 http://dx.doi.org/10.14257/astl.2013.29.03 Distributed ID-based Signature Using Tamper-Resistant Module Shinsaku Kiyomoto, Tsukasa Ishiguro, and Yutaka Miyake KDDI R & D Laboratories Inc., 2-1-15,

More information

Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure

Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure Keith M. Martin Maura B. Paterson Information Security Group Royal Holloway, University of London

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 4.3 Group Key Distribution Acknowledgment: Slides on LKH were originally provided by Dr. Wensheng Zhang at Iowa State. Dr. Peng Ning CSC 774

More information

Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode

Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode Int. J. Nonlinear Anal. Appl. 5 (2014) No. 2, 60-66 ISSN: 2008-6822 (electronic) http://www.ijnaa.semnan.ac.ir Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode

More information

Chapter 4: Naming and addressing

Chapter 4: Naming and addressing Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ attacks against naming and addressing: - address stealing - Sybil attack - node replication attack; protection mechanisms: - Cryptographically

More information