Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks

41
Efficient Public Key Efficient Public Key Infrastructure Infrastructure Implementation in Implementation in Wireless Sensor Networks Wireless Sensor Networks Wireless Communication and Sensor Computing, 2010. ICWCSC 2010. International Conference on 報報報 報報報

description

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks. Wireless Communication and Sensor Computing, 2010. ICWCSC 2010. International Conference on 報告者:林昌宏. Outline. Introduction Security In Wireless Sensor Networks State Of The Art Encryption Algorithms - PowerPoint PPT Presentation

Transcript of Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks

Page 1: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Efficient Public Key Efficient Public Key Infrastructure Infrastructure

Implementation in Implementation in Wireless Sensor NetworksWireless Sensor Networks

Wireless Communication and Sensor Computing, 2010. ICWCSC 2010.

International Conference on

報告者:林昌宏

Page 2: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

OutlineOutline Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 3: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 4: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

IntroductionIntroductionSecurity is an important issue when

designing network or protocol, but taking into account the specificity of WSN, it haven’t given the necessary attention to security.

The problem of security is regarding the limitation of sensors the deployed environment

small memoryweak processorlimited battery power of sensor nodes

Page 5: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction(cont.)Introduction(cont.)The proposed schemes in literature

aren’t secure. using some simplified techniques, like

symmetric encryption, to ensure all security services.

The author proposes an implementation of a combination of symmetric and asymmetric encryption.

Page 6: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 7: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Security In Wireless Sensor Security In Wireless Sensor NetworksNetworks

A. Security services Confidentiality Integrity Authentication

B. Public key cryptography

Page 8: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

ConfidentialityConfidentialityEnsuring that the exchanged data is kept

secret from any unauthorized entities over the network.

Considering the consumption of devices resources, symmetric encryption is more efficient.

It must also protect information from long term eavesdropping by using periodic key update.

Page 9: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

IntegrityIntegrityThe message should be un-altered

during its transmission from a source to destination by any intermediate sensor or malicious node. MAC(Message Authentication Code) Digital signatures

Page 10: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

AuthenticationAuthenticationThe process of identification that a

receiving entity is sure that the message comes from a legitimate source.

using Public Key Infrastructure.

In WSN, however, it is usually done by pre-distributing some bootstrapping information used after to authenticate sensors by the base station.

Page 11: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Public key cryptographyPublic key cryptographyIt uses two keys, public key and private

key, to do encryption and decryption. Public key : publicly known by each entity. Private key : kept secret by it holder.

However, PKI is omitted from the use in WSN, because of its great consumption of energy and bandwidth which are very crucial in sensor network.

Page 12: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Public key Public key cryptography(cont.)cryptography(cont.)

Elliptic Curve Cryptography (ECC), is the most one of new cryptographic algorithms. Having more energy efficient for sensors. Giving the same threshold of security as the

conventional algorithms with much smaller key sizes to save more memory.

This paper presents a lightweight public key infrastructure for WSN called micro PKI.

Page 13: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 14: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

State Of The ArtState Of The Art

A. Symmetric encryption based schemes

Shared key Pre-distributed keys

B. Public key based schemes Simplified Kerberos protocol

Page 15: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Shared keyShared keyThis solution is the simplest way for

securing WSN.It uses a single shared key to encrypt

traffic over the network, and this key may be periodically updated to ensure more security against eavesdropping.

But it is vulnerable against capture attack which can compromise the shared key and then the whole network.

Page 16: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Pre-distributed keysPre-distributed keysAn off-line dealer distributes a set of

symmetric keys to sensors before their deployment.

a. A random key pre-distribution scheme for WSN in which sensor obtains a subset of symmetric keys from a large key pool.

b.After deployment, each sensor tries to find a shared key with each of its neighbors to secure the links with them.

c.Managing how to obtain the session key between sensors and the base station.

Page 17: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Simplified Kerberos Simplified Kerberos protocolprotocol

Setup a session key between each communicating pair of sensors by contacting a trusted third party (the base station).

There is a long term key shared between each node and the base station, and the base station generates the secret key for each pair of sensors.

Page 18: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Simplified Kerberos Simplified Kerberos protocol(cont.)protocol(cont.)

Disadvantage:it is vulnerable against capture attacks to

exposed sensor.the handshaking is not energy saving.it may consume lot of network resources if

the base station is far from the pair of nodes.

Page 19: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 20: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Encryption AlgorithmsEncryption Algorithms

A. Elliptic Curve Cryptography

B. Message Authentication Codes

Page 21: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Elliptic Curve Elliptic Curve CryptographyCryptography

The ECC algorithm can be classified as the one of the most efficient asymmetric algorithms regarding its energy cost and its encryption speed.

Algorithm Sign MIPS Years to Attack

RSA-1024 304 1012

ECC-160 22.82

RSA-2048 2302.7 1024

ECC-224 61.54

Energy cost of digital signature (mJ)

Page 22: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Message Authentication Message Authentication CodesCodes

MACs is the common solution to ensure integrity and authentication of messages in conventional networks.

A MAC can be viewed as hash function applied on data packets, and is encrypted by the session key.

A receiver sharing the same session key can verifies the integrity of the message by computing MAC value and comparing it with the received one.

Page 23: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 24: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Micro PKI For WSNMicro PKI For WSNMicro PKI is a lightweight implementation

of PKI for WSN since it only implements a subset of a conventional PKI services.

A.Network ArchitectureB.Micro PKI System BootstrappingC.Base Station To Sensor Nodes HandshakeD.Sensor To Sensor HandshakeE.Micro PKI FunctioningF.Micro PKI Key Update G.Joining The Network

Page 25: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Network ArchitectureNetwork ArchitectureThe base station have more computational

and energy power compared to sensors.The base station has a pair of keys(private

and public key).Each sensor is capable to use symmetric

and asymmetric encryption.Each sensor has the capacity to save at

least the public key of the base station and a session key used for data encryption.

Each sensor node gets the public key of the base station before deployment from an off-line dealer.

Page 26: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Micro PKI System Micro PKI System BootstrappingBootstrapping

Before the deployment of the WSN, an off-line dealer distributes the public key of the base station to each sensors in the network.

This public key is used after in the handshake between the base station and sensors to encrypt the symmetric session key.

Page 27: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Base Station To Sensor Base Station To Sensor Nodes HandshakeNodes Handshake

1. Sensor generates a random session key, encrypts it with the public key of the base station, and then sends the message embedded the encrypted key to the base station.

2. The base station decrypts this message using its private key and saves the session key in a global table which has all session keys corresponding to each sensor in the network.

3. The base station encrypts an OK message using the established session key, and sends to sensor to ensure that the session key setup is successful.

Page 28: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Base Station To Sensor Nodes Base Station To Sensor Nodes Handshake(cont.)Handshake(cont.)

Micro PKI handshake ensures a great level of security, since it uses both symmetric and asymmetric encryption to secure the session key.

After the establishment of the session key, the sensor and the base station begin to use it for data encryption until the next key update.

Page 29: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Sensor To Sensor Sensor To Sensor HandshakeHandshake

After the establishment of the base station to sensor nodes, sensors can establish a secure tunnel between them for any purpose.

1.One of the two sensors sends a request which contains the identifier of the corresponding sensors to the base station.

2.The base station generates a random key for this propose, and saves the pairs of sensors’ identifier and corresponding session key in the global table.

Page 30: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Sensor To Sensor Sensor To Sensor Handshake(cont.)Handshake(cont.)

3. The base station encrypts the requested session key by using the corresponding key between the base station and the sensor.

4. When receiving the new session key by sensors, they begin to use it to secure the data transmission between themselves.

Page 31: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Micro PKI FunctioningMicro PKI FunctioningIn order to guaranty the integrity and the

authenticity of the exchanged between each communicating parties, a MAC encrypted by session key is embedded to the packet.

By verifying the joined MAC, if the verification fails, this means that there may have an attacker which has altered this packet.

Using a mechanism like multi-path routing to avoid this attacker, otherwise the base station use any mechanism to detect and exclude this attacker from the network, if it exists.

Page 32: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Micro PKI Key UpdateMicro PKI Key UpdateA key update tries to prevent long term

attack aiming to extract the encrypting keys by analyzing the encrypted traffic over the network for long time.

In a WSN, an automatic key update must be defined, since a network can be deployed for many days or months.

The key update is initiated by the sensor node by launching new handshake, and the period time is relative to the key length and the complexity of the used algorithm.

Page 33: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Joining The NetworkJoining The NetworkIf a new node wants to join the

network, the administrator must load the public key of the base station into this node.

After getting the public key, the new sensor can automatically launch a handshake and join the network.

Page 34: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 35: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

AnalysisAnalysis

A. Security services Scalability Confidentiality Authentication Integrity

B. Energy cost analysis of micro PKI

Page 36: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Security servicesSecurity services Scalability

Micro PKI manages the increasing number of sensor nodes by new handshake and a new entry is created in the global table of the base station to manage connection.

Confidentiality

The use of symmetric encryption to encrypt the exchange data between the base station and sensors, and using periodic key update to prevent long term attacks.

Page 37: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Security services(cont.)Security services(cont.) Authentication

By pre-installing the public key of base station in each deployed sensor, the authenticity of the base station can be authenticated by sensors.

IntegrityComputing and joining MAC to each packet between the base station and any sensor over the network as well as between sensors.

Page 38: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Energy cost analysis of micro Energy cost analysis of micro PKIPKI

Operations Energy cost of sensor (mJ)

Sensorto

Base station handshake

Encrypt session key 22.82

Send a packet 3.78

Receive a packet 1.83

Decrypt OK message 0.039

Total 28.46

Sensor to Sensor

handshake

Send request message and Receive session key

message

3.66

Decrypt message 0.039

Total 3.70

Total energy cost of micro PKI 32.16

Energy cost of the simplified Kerberos 39.6 ~ 47.6

Energy cost of the simplified SSL 93.9

Page 39: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Introduction Security In Wireless Sensor

Networks State Of The Art Encryption Algorithms Micro PKI For WSN Analysis Conclusion

Page 40: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

ConclusionConclusionMicro PKI implement a combination of

symmetric and asymmetric encryption which tries to solve the problem of security in WSN.

By the use of public key cryptography as a tool, it ensures the authenticity of the base station.

Micro PKI is composed of two phasesSensor to base station handshakeSensor to sensor handshake

Page 41: Efficient Public Key Infrastructure Implementation in  Wireless Sensor Networks

Conclusion(cont.)Conclusion(cont.)Ensuring the confidentiality and

integrity of the exchanged data using the MAC joined to each packet.

For more security, a periodic key update is defined for the session key

Micro PKI is energy efficient and gives a considerable threshold of security.