s ns r n t sensor network security rk s curit
play

S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor - PowerPoint PPT Presentation

3/2/2017 S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor Network Security (Simon S. Lam) 1 1 3/2/2017 R. Blom, An optimal class of symmetric key generation systems, R. Blom, An optimal class of symmetric key generation


  1. 3/2/2017 S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor Network Security (Simon S. Lam) 1 1

  2. 3/2/2017 R. Blom, “An optimal class of symmetric key generation systems,” R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84 , Lecture Notes in Computer Science, Springer-Verlag, 209:335–338, 1985. Reference on application to sensor networks Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, ”A Pairwise Key Pre distribution Scheme for Wireless Sensor Networks ” Proceedings of the Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, October 2003. 3/2/2017 Sensor Network Security (Simon S. Lam) 2 2

  3. 3/2/2017 Motivation  Ad hoc networks with no trusted infrastructure support  Sensors have limited computation, storage, and energy resources o use symmetric key encryption o use symmetric key encryption  Standard solutions to enable key agreement y b t between computing devices are not appropriate ti d i t i t o Public key algorithms o Trusted server 3/2/2017 Sensor Network Security (Simon S. Lam) 3 3

  4. 3/2/2017 Pre-distribution of symmetric keys  Naïve solution – each node has the same master key master key o One node compromised => entire network compromised mp m  For a network of N nodes, each node is pre- installed with N-1 symmetric keys for all y y other nodes o Not scalable 3/2/2017 Sensor Network Security (Simon S. Lam) 4 4

  5. 3/2/2017 Blom’s key pre-distribution scheme λ -secure property  When an adversary compromises less than or equal to λ nodes uncompromised nodes are equal to λ nodes, uncompromised nodes are perfectly secure.  When an adversary compromises more than λ nodes, all pairwise keys of the entire network , p y are compromised 3/2/2017 Sensor Network Security (Simon S. Lam) 5 5

  6. 3/2/2017 Pre-deployment phase  A trusted controller first constructs a ( λ +1)xN matrix, G, over a finite field GF(q), where o N is the number of nodes N is the number of nodes o G is public information o q is a prime number larger than 2 n , where n is number of bits in a key bits in a key  Then the controller o creates a random ( λ +1)x( λ +1) symmetric matrix D over GF( ) GF(q) o Matrix D is secret known only to the controller o The controller computes an Nx( λ +1) matrix A= (D.G) T where (D.G) T is the transpose of matrix D.G 3/2/2017 Sensor Network Security (Simon S. Lam) 6 6

  7. 3/2/2017 Pre-deployment phase (2)  Because D is symmetric, we have A.G = (D.G) T .G = G T .D T .G = G T .D.G = G T .A T = (AG) T Thus, AG is a symmetric matrix to be denoted by K = AG , where K ij = K ji , for all 1 ≤ i, j ≤ N , which can be used as the pairwise key between p y nodes i and j Comment: Since i and j share a private key encrypted Comment: Since i and j share a private key, encrypted messages between them may be relayed by other nodes 3/2/2017 Sensor Network Security (Simon S. Lam) 7 7

  8. 3/2/2017 Blom’s key pre-distribution  The controller stores the kth row of matrix A in node k and the kth row of matrix A in node k, and the kth column of matrix G at node k  When nodes i and j need to communicate  When nodes i and j need to communicate confidentially, o they first exchange their columns of G (which is o they first exchange their columns of G (which is public info) in plaintext o then i and j compute K ij and K ji , respectively, using each node’s private info (row of A) and i h d ’ i i f ( f A) d received column of G 3/2/2017 Sensor Network Security (Simon S. Lam) 8 8

  9. 3/2/2017 Blom’s scheme illustrated private public Node i Node j If any λ +1 columns of G are linearly independent, then the above scheme is λ -secure 3/2/2017 Sensor Network Security (Simon S. Lam) 9 9

  10. 3/2/2017 An example of matrix G  Let each pairwise key be an element in the finite field GF(q), where q is the smallest prime f eld GF(q), where q s the smallest pr me number larger than 2 n o for keys represented by n bits  Let s be a primitive element of GF(q) and q > N p q q o each nonzero element in GF(q) can be represented by some power of s o s i ≠ s j for i ≠ j j f i j i 3/2/2017 Sensor Network Security (Simon S. Lam) 10 10

  11. 3/2/2017 An example of matrix G (cont.) A Vandermonde matrix !  s, s 2 …, s N are all distinct  any λ +1 columns of G are linearly independent  only the seed s k of the kth column is stored in node k  only the seed s of the kth column is stored in node k 3/2/2017 Sensor Network Security (Simon S. Lam) 11 11

  12. 3/2/2017 The End 3/2/2017 Sensor Network Security (Simon S. Lam) 12 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend