100 likes | 229 Views
Security in Sensor Networks. By: Tracy Barger, David Friedman, and Stavan Parikh. MEMS – Microelctromechanical Systems. Swarms ??. Group Behavior Bees ! MEMS (Smart Dust). Applications Surveillance Smart House Grocery Shopping FedEx tracking on Steroids. Environment Constraints.
E N D
Security in Sensor Networks By: Tracy Barger, David Friedman, and Stavan Parikh
MEMS – Microelctromechanical Systems Swarms ?? • Group Behavior Bees ! • MEMS (Smart Dust) • Applications • Surveillance • Smart House • Grocery Shopping • FedEx tracking on Steroids
Environment Constraints • Power • Processor: 8 bit • Memory: 15K • RAM: 512 bytes • Devices not individually addressable
Trust Model • Base Station • Complete Trust • Requires Authentication • Motes • Trust Self • Broadcast Communication: Insecure • Need Encryption
Key Distribution and Encryption • Use symmetric cipher • Keys pre-initialized in motes • Use J-secure scheme (NAI Paper) • n nodes, y groups • All nodes in a group have same key K1 K2 Note: If security is a priority, keys can be refreshed using a group key distribution scheme such as key graphs
Group Size Tradeoffs 1 n s • What’s optimal group size? • s = group size • Tradeoff:security v. # communications v. memory • Small, one-hop -- Use s = 1
Hash-based Authentication Generates Xn; Calculates key Chain: H(Xn) = X n-1… H(X1)= X0 M = E(Command || Xi) Mote decrypts M, Checks H(Xi) = Xi-1 Then stores Xi in place of Xi-1
Conclusion • Examined current security techniques • Key Distribution • Authentication • Tradeoff between modifying existing and starting from scratch • May be more beneficial to create new protocols • Security will be defined by application