A Security Protocol for Sensor Networks
Download
Report
Transcript A Security Protocol for Sensor Networks
A Security Protocol for Sensor
Networks
Khadija Stewart, Themistoklis Haniotakis
and Spyros Tragoudas
Dept. of Electrical and Computer
Engineering
Southern Illinois University
Outline
Abstract
Previous work
Proposed method
Uncorrelating the bits
Encryption scheme
Reverse uncorrelation and decryption scheme
Hardware overhead
Experimental results
Conclusions
2
Abstract
Sensor networks are extensively used in
military and rescue operations
Need for secure communications
Memory, computational and energy
resource constraints
Security protocol must use minimal
resources
Available security schemes are either
inefficient or expensive
3
Previous Work
Key based schemes
Frankel et al 1989
Eshenaur et al 2002
Chan et al 2003
Liu et al 2003
Du et al 2005
4
Previous Work
Keyless methods target flexibility
Rabin 1989
Papadimitratos et al 2003
5
Proposed Method: Outline
Message split into 2n sub-messages
Sub-messages uncorrelated using an LFSR
Sub-messages encrypted
Encrypted sub-messages are routed through
transmission disjoint routes
At the destination, sub-messages are
decrypted and uncorrelation is reversed
6
Proposed Method:
Splitting of the message
a0
a1
a2
a3
a4
a5
a6
a7
a8
a9
a10
a11
Number of columns of array B = Number of node disjoint paths
b0,0(a0)
b0,1(a1)
b0,2(a2)
b0,3(a3)
b1,0(a4)
b1,1(a5)
b1,2(a6)
b1,3(a7)
b2,0(a8)
b2,1(a9)
b2,2(a10)
b2,3(a11)
Globecom 05
7
Proposed Method:
Uncorrelating the bits
LFSRs primarily used in circuit testing to produce
pseudo-random patterns
A different LFSR chosen for each sub-message i
Characteristic polynomial and ti are encoded and
appended to the outgoing sub-message
Example of an LFSR with k = 3 and T = 7
011
001
100
010
101
110
111
8
Proposed Method:
Encryption Scheme
For i=0 to m-1
Xi = bi,0 XOR bi,1 XOR…XOR bi,2n-1
For i=0 to m-1
For j=0 to 2n-1
Ci,j = Xi XOR bi,j
9
Proposed Method
Sub-messages are routed through node
disjoint routes
Routes only need to be node disjoint due to
the use of directional antennas
A mote can overhear transmission if and only
if it is within transmission range and in angular
span of sending node
Globecom 05
10
Proposed Method:
De-uncorrelation and decryption Scheme
Procedure decode
For i=0 to m-1
For i=0 to m-1
Xi = ci,0 XOR ci,1 XOR…XOR ci,2n-1
For j=0 to 2n-1
b
i,j = Xi XOR ci,j
Sub-messages reverse uncorrelated in a similarly
designed LFSR
Globecom 05
11
Hardware Overhead
The hardware requirements are:
An m bit LFSR
Two levels of XOR gates
One level is used for encryption and the
other is used with the LFSR
Three levels of multiplexers
2x1 multiplexers at the inputs of XOR gates
4nx2n multiplexers to initiate LFSR
12
Experimental Results:
Area and power requirements
Power consumption of RSA chip is in the
order of 500 mW
Power and area of ECC module is over
300 mW and 24,000 square microns
Security module designed and
synthesized in VHDL for a 512 bit ckt
Power consumption 5 micro Watts
Area less than 25 square microns
13
Experimental Results:
Performance measurements using OPNET
Experiments conducted on networks of
60, 70, 80, 90 and 100 motes with 90
degree directional antennas
Wireless transmission range set to 25
meters
14
Experimental Results:
One intruder
Experiments ran 10 times for each
network size. In each run, a random
node chosen as intruder
Number of paths = maximum even
number of node disjoint paths
Used destinations at least two hops
away
No single intruder node was able to
intercept a complete message
15
Experimental Results:
Multiple intruders
70 motes
# intruders
# of disjoint paths
2
4
6 max
2
6
3
0 0
4
8
6
2 1
6
10
8
4 2
8
12
8
6 2
Percentage of messages intercepted for different numbers of paths
As the number of paths increases, the
number of intercepted messages decreases
16
Experimental Results:
Performance of scheme in presence of several intruders
# motes
# paths # intruders
2
4
6
8
10
60
4
0
2
4
4
4
70
6
0
1
2
2
4
80
8
0
1
3
3
4
90
10
0
1
2
2
3
100
12
0
1
2
2
3
Percentage of messages intercepted in the presence of
different numbers of collaborating nodes
Low interception rates even for large number
of intruders
17
Conclusions
An encryption method and uncorrelation
scheme for secure message
transmission in sensor networks
Experimental results show
Low resource requirements of proposed
method
Efficiency of proposed method in protecting
secrecy of messages
18
Questions?
Thank you
19