adaptive security for wireless sensor networks

19
Adaptive Security for Wireless Sensor Networks Master Thesis June 2006

Upload: ruby-lamb

Post on 03-Jan-2016

42 views

Category:

Documents


2 download

DESCRIPTION

Adaptive Security for Wireless Sensor Networks. Master Thesis – June 2006. Table of contents. I Introduction II Security Aspects in WSN III The Proposal - Security Manager - Context Monitoring Algorithm - Adaptive Security System Building Blocks - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Adaptive Security  for  Wireless Sensor Networks

Adaptive Security for

Wireless Sensor Networks

Master Thesis – June 2006

Page 2: Adaptive Security  for  Wireless Sensor Networks

Table of contents

I Introduction

II Security Aspects in WSN

III The Proposal

- Security Manager - Context Monitoring Algorithm

- Adaptive Security System Building Blocks - Building Blocks & Information procedure diagram

IV Results

V Conclusions

2/19

Page 3: Adaptive Security  for  Wireless Sensor Networks

Introduction

• Sensor nodes are able to improve lots of applications (medical, industrial, intelligent environments…)

• Work is focused on the adaptive security of a wireless sensor networks

• A new feature is introduced: the Security Manager

• One specific scenarios has been studied: healthcare monitoring

Results

Conclusions

Our Proposal

Introduction

Security in WSN

3/19

Page 4: Adaptive Security  for  Wireless Sensor Networks

Security aspects

• Weak points of Security in WSN:

– Communication between sensor nodes and the aggregator.

– The aptitude of a network to counterattack.– The ability to protect privacy

• Real need for a secure and an easy-to-use network

– We assume that the base station is a point-of-trust– The nodes must have robust solution against attacks:

• Use of authentication protocols and cryptography techniques

Results

Conclusions

Our Proposal

Introduction

Security in WSN

4/19

Page 5: Adaptive Security  for  Wireless Sensor Networks

Our Proposal

• Security Manager

• Context Monitoring Algorithm

• Adaptive Security System building blocks

• Building blocks and information procedure diagram

Results

Conclusions

Our Proposal

Introduction

Security in WSN

5/19

Page 6: Adaptive Security  for  Wireless Sensor Networks

Authentication and Encryption Processes

Authentication :

Diffie-Hellman

Elliptical curve equation

Encryption :

RC5 algorithm

X-OR operation

Flags

Key determination protocol

Message Encryption protocol

Results

Conclusions

Our Proposal

Introduction

Security in WSN

6/19

Page 7: Adaptive Security  for  Wireless Sensor Networks

Security Levels

Three Levels of Security:

Low Level

RC5 - 32/6/3

Medium Level

RC5 - 32/6/5

High Level

RC5 - 32/12/5

Block length of clear text

Key length (in bytes)

Number of rounds

Results

Conclusions

Our Proposal

Introduction

Security in WSN

7/19

Page 8: Adaptive Security  for  Wireless Sensor Networks

The Context Monitoring Algorithm

Determine an adaptive reaction to maintain the network’s integrity and functionalities.

Responsible for:

Tracking and Reporting the network’s status

Checking the anomalies

Monitoring the context information

Results

Conclusions

Our Proposal

Introduction

Security in WSN

8/19

Page 9: Adaptive Security  for  Wireless Sensor Networks

Functionalities of the CMA

Broadcast requests

Analize traffic:

Check the number of messages.

Below expected Find deficient node

Increase the level of security

Above expected Revoke and change the nodes’ key

Increase the level of security

Results

Conclusions

Our Proposal

Introduction

Security in WSN

9/19

Page 10: Adaptive Security  for  Wireless Sensor Networks

Functionalities of the CMA

Scan for attacks:

CRC Errors Change Channel

Aggregator DoS Revoke and change all the keys

Increase the level of security

Compromised node Revoke its key

Send notification to the user and to the hospital database

Power Control Management

Check the batteries status and send notification to the user

Control the emitting power of nodes and aggregator.

Results

Conclusions

Our Proposal

Introduction

Security in WSN

10/19

Page 11: Adaptive Security  for  Wireless Sensor Networks

Adaptive Security System Building Blocks

Results

Conclusions

Our Proposal

Introduction

Security in WSN

11/19 (half-time)

Page 12: Adaptive Security  for  Wireless Sensor Networks

Building Blocks &

Information procedure diagram

Results

Conclusions

Our Proposal

Introduction

Security in WSN

12/19

Page 13: Adaptive Security  for  Wireless Sensor Networks

Results

•Aim : Find the best compromise between performance and security

•Conditions: Test bed:

- Processor Frequency: 540MHz

- Processing Unit: 32 bits

Real case (Mica2dot):- Processor Frequency: 4Mhz- Processing Unit: 8 bits

•Assumptions: Linear relation between the 2 processing units The gain in processing time is equivalent to the gain of

battery lifetime Reference – High Level of Security Key Exchange frequency : 4hours Message Sample Rate : 10 sec (according to Code Blue)

Results

Conclusions

Our Proposal

Introduction

Security in WSN

13/19

Page 14: Adaptive Security  for  Wireless Sensor Networks

Performances of the System

• Evolution of the processing time and the key robustness regarding the level of security

Processing Time Gain 30%

Processing Time Gain 10%

Processing Time Gain 0%0%

5%

10%

15%

20%

25%

30%

35%

low medium high

1,5 hoursto break the Key

4712 daysto break the Key

2740 yearsto break the Key

Results

Conclusions

Our Proposal

Introduction

Security in WSN

14/19

Page 15: Adaptive Security  for  Wireless Sensor Networks

Performances of the System

• Using our simulator and creating a typical day scenario, we have obtained the following results:

Processing time 81%

Gain 19%

Processing time 100%

w ith adaptive security w ithout adaptive security

Results

Conclusions

Our Proposal

Introduction

Security in WSN

15/19

Page 16: Adaptive Security  for  Wireless Sensor Networks

Performances of the System• Why did we choose 4hours for the key exchange

frequency?

Only in the trusted place the time to break the key is less than 4 h. By increasing the key exchange frequency the battery consuming

highly increases

Processing time 45%

Gain due to a lower key exchange sample

rate 29%

Gain 26%

Processing time 74%

Gain 26%

Processing time 100%

with adaptive security(key exchange

frequency :4hours)

with adaptive security(key exchange

frequency :1,4hours)

without adaptivesecurity (key exchangefrequency :1,4hours)

Results

Conclusions

Our Proposal

Introduction

Security in WSN

16/19

Page 17: Adaptive Security  for  Wireless Sensor Networks

Performances of the System

• The influence of the message sample rate on the energy consumption

Processing time 15%

Gain due to a lower message sample rate

77%

Gain 8%

Processing time 92%

Gain 8%

Processing time 100%

with adaptive security(Message sample rate:

10sec.)

with adaptive security(Message sample rate:

1sec.)

without adaptive security(Message sample rate :

1sec.)

Results

Conclusions

Our Proposal

Introduction

Security in WSN

17/19 (almost done)

Page 18: Adaptive Security  for  Wireless Sensor Networks

Conclusions

• New solution based on the ECC and the Diffie-Hellman protocol

• Caution when labeling a place as “trusted”

• The adaptability of the system increases sensor nodes battery’s lifetime

• The user’s behavior is intimately connected to the security parameters, i.e. to the battery lifetime saved.

• Ability to track the network status and ensure a quick response

Results

Conclusions

Our Proposal

Introduction

Security in WSN

18/19

Page 19: Adaptive Security  for  Wireless Sensor Networks

Thank you for your attention

… and Happy New Year