Security in Wireless Sensor Networks:: Key Management Approaches
Security in Wireless Sensor Networks:: Key Management Approaches
Networks:
Key Management Approaches
Overview
Overview
Pre-Deployed Keying
Key pre-deployment
Key derivation information pre-deployment
Location aware pre-deployed keying
Autonomous protocols
Arbitrated protocols
Conclusions
Sensor Networks
Applications
Attacker types:
Attacks on WSN
A4
A1
A2
A3
Selective forwarding
Sinkhole attack:
Sybil attack:
Wormholes
Wormholes (cont.)
Acknowledgment spoofing
Overview of Countermeasures
Battery power
Transmission range
Memory
Temper protection
Sleep pattern
Network constraints:
Key management:
evaluation/comparison metrics
Approaches to be discussed
Pre-deployed keying:
Key pre-deployment
Straightforward approaches
Eschenauer / Gligor random key pre-deployment
Chan / Perrig q-composite approach
Zhu / Xu approach
DiPietro smart attacker model and PRK protocol
Arbitrated protocols
Key pre-distribution
Shared-key discovery
Path-key establishment
Simulation results
1000 nodes, 40 nodes neighborhood, P=10000
number of hops
Key revocation
WSN connectivity
Random graphs
e c
(1)
where
p
ln( n) c
n
n
(2)
Random-graphs (cont.)
k 2( P k 1 / 2)
(1 )
P
p' 1
2k ( P 2 k 1 / 2)
(1 )
P
q-composite approach
Zhu / Xu approach
Further enhancements
Key id notification
Challenge response
Pseudorandom key id generation
Smart attacker
Simulation results
Simulation results
PRK algorithm
PRK algorithm
Key pre-distribution
Key discovery
For each key vbj in its key ring sensor sb computes z=fy(a||vbj)
If z0 mod (P/K), sensor sa also has key sb
Benefits:
Drawbacks:
Special case: =1
Each node has an id rU which is unique and is a member of
finite field Zp
Three elements a, b, c are chosen from Zp
Polynomial f(x,y) = (a + b(x + y) + cxy) mod p is generated
For each node polynomial share gu(x) = (an+ bnx) mod p
where an= (a + brU) mod p and bn= (b + crU) mod p is formed
and pre-distributed
Example:
3 nodes: U, V, W, with the following ids 12, 7, 1
respectively
p=17 (chosen parameter)
a=8, b=7, c=2 (chosen parameters)
Polynomial f(x,y) = 8+7(x+y)+2xy
g polynomials are gu(x) = 7 + 14x, gv(x) = 6 + 4x,
gw(x) = 15+9x
Keys are Ku,v=3, Ku,v=4, Ku,v=10
U computes Ku,v= gu(rv) = 7+14*7mod17 = 3
V computes Kv,u= gv(ru) = 6+4*12mod17 = 3
f ( x, y ) ai , j x i y j mod p; f ( x, y ) f ( y, x)
i 0 j 0
g u ( x) f ( x, ru ) mod p au ,i x i
i 0
Liu-Ning approach
Setup phase
Simulation results
Subset assignment
Path discovery
Sensor nodes
Gateways
Are equipped with GPS modules and can determine its location
during bootstrapping
Remain stationary
Can unicast / broadcast information to other gateways on the
network
Can establish the group key using a group key agreement
protocols
Command node
Benefits:
Drawbacks:
Problem:
Solution:
Detemining |Sc|
Performance Evaluation
Evaluation Metrics
System configuration
Local Connectivity
Plocal = Pr((B(n1,n2)|A(n1,n2))
Global connectivity
Communication overhead
1 (1 m/|S|)^x
P-RKP vs SK-RKP
Robustness of both weakened by selective node capture attack
Key Predistribution (I
Scheme) within a given zone
Performance Analysis
Memory overhead
Security Analysis
Performance Analysis
(Security)
Summary
Bibliography
Bibliography
Bibliography