s ns r n t sensor network security rk s curit
play

S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor - PowerPoint PPT Presentation

3/2/2017 S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor Network Security (Simon S. Lam) 1 1 3/2/2017 R. Blom, An optimal class of symmetric key generation systems, R. Blom, An optimal class of symmetric key generation


  1. 3/2/2017 S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor Network Security (Simon S. Lam) 1 1

  2. 3/2/2017 R. Blom, “An optimal class of symmetric key generation systems,” R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84 , Lecture Notes in Computer Science, Springer-Verlag, 209:335–338, 1985. Reference on application to sensor networks Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, ”A Pairwise Key Pre distribution Scheme for Wireless Sensor Networks ” Proceedings of the Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, October 2003. 3/2/2017 Sensor Network Security (Simon S. Lam) 2 2

  3. 3/2/2017 Motivation  Ad hoc networks with no trusted infrastructure support  Sensors have limited computation, storage, and energy resources o use symmetric key encryption o use symmetric key encryption  Standard solutions to enable key agreement y b t between computing devices are not appropriate ti d i t i t o Public key algorithms o Trusted server 3/2/2017 Sensor Network Security (Simon S. Lam) 3 3

  4. 3/2/2017 Pre-distribution of symmetric keys  Naïve solution – each node has the same master key master key o One node compromised => entire network compromised mp m  For a network of N nodes, each node is pre- installed with N-1 symmetric keys for all y y other nodes o Not scalable 3/2/2017 Sensor Network Security (Simon S. Lam) 4 4

  5. 3/2/2017 Blom’s key pre-distribution scheme λ -secure property  When an adversary compromises less than or equal to λ nodes uncompromised nodes are equal to λ nodes, uncompromised nodes are perfectly secure.  When an adversary compromises more than λ nodes, all pairwise keys of the entire network , p y are compromised 3/2/2017 Sensor Network Security (Simon S. Lam) 5 5

  6. 3/2/2017 Pre-deployment phase  A trusted controller first constructs a ( λ +1)xN matrix, G, over a finite field GF(q), where o N is the number of nodes N is the number of nodes o G is public information o q is a prime number larger than 2 n , where n is number of bits in a key bits in a key  Then the controller o creates a random ( λ +1)x( λ +1) symmetric matrix D over GF( ) GF(q) o Matrix D is secret known only to the controller o The controller computes an Nx( λ +1) matrix A= (D.G) T where (D.G) T is the transpose of matrix D.G 3/2/2017 Sensor Network Security (Simon S. Lam) 6 6

  7. 3/2/2017 Pre-deployment phase (2)  Because D is symmetric, we have A.G = (D.G) T .G = G T .D T .G = G T .D.G = G T .A T = (AG) T Thus, AG is a symmetric matrix to be denoted by K = AG , where K ij = K ji , for all 1 ≤ i, j ≤ N , which can be used as the pairwise key between p y nodes i and j Comment: Since i and j share a private key encrypted Comment: Since i and j share a private key, encrypted messages between them may be relayed by other nodes 3/2/2017 Sensor Network Security (Simon S. Lam) 7 7

  8. 3/2/2017 Blom’s key pre-distribution  The controller stores the kth row of matrix A in node k and the kth row of matrix A in node k, and the kth column of matrix G at node k  When nodes i and j need to communicate  When nodes i and j need to communicate confidentially, o they first exchange their columns of G (which is o they first exchange their columns of G (which is public info) in plaintext o then i and j compute K ij and K ji , respectively, using each node’s private info (row of A) and i h d ’ i i f ( f A) d received column of G 3/2/2017 Sensor Network Security (Simon S. Lam) 8 8

  9. 3/2/2017 Blom’s scheme illustrated private public Node i Node j If any λ +1 columns of G are linearly independent, then the above scheme is λ -secure 3/2/2017 Sensor Network Security (Simon S. Lam) 9 9

  10. 3/2/2017 An example of matrix G  Let each pairwise key be an element in the finite field GF(q), where q is the smallest prime f eld GF(q), where q s the smallest pr me number larger than 2 n o for keys represented by n bits  Let s be a primitive element of GF(q) and q > N p q q o each nonzero element in GF(q) can be represented by some power of s o s i ≠ s j for i ≠ j j f i j i 3/2/2017 Sensor Network Security (Simon S. Lam) 10 10

  11. 3/2/2017 An example of matrix G (cont.) A Vandermonde matrix !  s, s 2 …, s N are all distinct  any λ +1 columns of G are linearly independent  only the seed s k of the kth column is stored in node k  only the seed s of the kth column is stored in node k 3/2/2017 Sensor Network Security (Simon S. Lam) 11 11

  12. 3/2/2017 The End 3/2/2017 Sensor Network Security (Simon S. Lam) 12 12

Recommend


More recommend