University Division/Office
08.10.13 Page 1
Security Policy Reconfiguration Solutions in Wireless Sensor Networks
UZH 655/678 Seminar: Internet Economics
- Prof. Dr. Burkhard Stiller
Security Policy Reconfiguration Solutions in Wireless Sensor - - PowerPoint PPT Presentation
University Division/Office Security Policy Reconfiguration Solutions in Wireless Sensor Networks UZH 655/678 Seminar: Internet Economics - Prof. Dr. Burkhard Stiller By Sanjiv Jha, Raphael Ochsenbein & Anastasia Ruvimova Supervisor: Dr.
University Division/Office
08.10.13 Page 1
08.10.13 University of Zurich, Division/Office, Title of the presentation, Author Page 2
○ Security Issues & Attack Vectors ○ Defense Mechanisms
○ Effective Key Management for WSN’s ○ Trust-based Enforcement of Security Policies ○ Dynamic Reconfiguration (Intra-trust and Famiware)
08.10.13 University of Zurich, Division/Office, Title of the presentation, Author Page 3
Intelligent transport system
Page 4
Page 5
WSN “Wireless sensor networks (WSNs) consist of hundreds or even thousands of small devices each with sensing, processing, and communication capabilities to monitor the real-world
ranging from critical military surveillance applications to forest fire monitoring and building security monitoring in the near future.” - I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, August 2002. Internet of things (IoT) “A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies. NOTE 1 – Through the exploitation of identification, data capture, processing and communication capabilities, the IoT makes full use of things to offer services to all kinds of applications, whilst ensuring that security and privacy requirements are fulfilled. NOTE 2 – From a broader perspective, the IoT can be perceived as a vision with technological and societal implications.”
2060-201206-I.
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Effective Key Management in dynamic WSN’s (cont.)
i high communication overhead ii large memory space iii not scalable iv not resilient to node compromise
i ECC (elliptic curve cryptography): feasible performance-wise ii resilient to node compromise attacks iii more scalable and flexible iv vulnerable to message forgery, key compromise known-key attacks
i certificateless public key cryptography (CL-PKC) ii the user’s full private key is a combination of a partial private key generated by a key generation center (KGC) and the user’ s own secret value iii pairwise key between nodes: a pairing-free certificateless hybrid signcryption scheme (CL-HSC)
Page 14
Effective Key Management in dynamic WSN’s (cont.)
i BS: Manages Network, collects Data, hosts a Key Generation Center (KGC) ii nodes with high processing capabilities (H-Sensors) iii nodes with low processing capabilities (L-Sensors)
i a certificateless public/private key pair ii an individual key iii a pairwise key iv a cluster key
i system setup ii pairwise key generation iii cluster formation iv key update v node movement vi key revocation vii addition of a new node
i issues certificateless public/private key pairs for each node ii a unique individual key, shared only between the node and the BS is assigned to each node iii certificateless public/private key of a node is used to establish pairwise keys between any two nodes iv a cluster key is shared among the nodes in a cluster
Page 15
Effective Key Management in dynamic WSN’s (cont.)
Page 16
Effective Key Management in dynamic WSN’s (cont.)
Page 17
Page 18
Page 19
[8]
Page 20
[8]
Page 21
Page 22
Page 23
Dynamic Software Product Lines Dynamic Security Framework
Page 24
Fami Ware with Inter-Trust Integration:
Page 25
Page 26
Page 27
Page 28
Page 29
Page 30
Page 31
Page 32
Page 33