Professional Documents
Culture Documents
IN WIRELESS SENSOR
NETWORKS
JOHNSON C.LEE, VICTOR C.M.LUENG,
KIRK H.WONG, JIANNANO CAO , HENRY C.B. CHAN
Presented By
Viplavi Donepudi
CMSC 681
Outline:
Introduction
Security and operational requirements for Key
Management
Key Distribution Schemes
Promising Key Management Protocols
Summary
Conclusion
Introduction
WSN is a network
formed by large
number of sensor
nodes where each
node is equipped with
a sensor to detect
physical phenomena
such as light, heat,
pressure etc
Introduction
WSN devices have severe resource constraints in
terms of energy, computation and memory.
Key Management include the processes of key
setup, the initial distribution of keys and key
revocation (removal of the compromised key).
Many Security-critical application that depend on
key management processes demand a high level of
fault tolerance when a node is compromised.
Security and operational requirements for
Key Management
Confidentiality- Nodes should not reveal data to any unintended
recipients.
Integrity- Data should not be changed between transmissions due to
environment or malicious activity.
Data Freshness- Old data should not be used as new.
Authentication- Data used in decision making process should originate
from correct source.
Robustness- When some nodes are compromised the entire network
should not be compromised.
Self-organization- Nodes should be flexible enough to be self-
organizing (autonomous) and self-healing (failure tolerant)
Availability- Network should not fail frequently.
Continued
Time Synchronization- These protocols should not be
manipulated to produce incorrect data.
Secure Localization- Nodes should be able to accurately and
securely acquire location information.
Accessibility- Intermediate nodes should be able to perform data
aggregation by combining data from different nodes.
Flexibility- Nodes should be replaceable when compromised.
Scalability- WSN should concurrently support at least 3000 nodes
even with key management in place.
Key Distribution Schemes
Three keying models are used to compare the
different relationships between WSN Security and
operational requirements
Network Keying
Pairwise Keying
Group Keying
Advantages & Disadvantages
Network Keying :
Benefits Problems
Simple Lacks
Allows data Robustness.
aggregation
and fusion
Scalable
Able to self-
organize
Flexible
Advantages & Disadvantages
Pairwise Keying:
Benefits Problems
Flexible.
Able to self-organize
with in cluster.
Promising Key Management Protocols
Eschenauer and Gligor:
This protocol is simple, elegant and provides effective
trade off between robustness and scalability.
In this scheme a large pool of keys are generated
(eg:10,000 keys)
Randomly take K keys out of the pool to establish a
key ring (K << N)
Path Key Discovery: When two nodes communicate
they search for a common key with in the key ring by
broadcasting their identities (IDs) of the keys they
have.
Advantages&Disadvantages:
Advantages:
Less than N-1 keys are stored
Scalable
Disadvantages:
It lacks authentication process and does not clearly define any process for
revoking or refreshing keys.
The dynamic handshaking process prevents any form of data aggregation
(eg: one event detected by two neighboring nodes will result in two
separate signals.)
No support for collaborative operations.
No node is guaranteed to have common key with all of its neighbors, there
is a chance that some nodes are unreachable.
Fails to satisfy security requirement authentication and operational
requirement accessibility.
Du, Deng, Han and Varshney: