Upload
nqdinh
View
60
Download
2
Tags:
Embed Size (px)
DESCRIPTION
sensor node, security, wsn, cryptographic
Citation preview
Martin Passing and Falko Dressler - 2006.
Implement well-know cryptographic algorithm in a hardware sensor node
To check their running time on low-hardware
Algorithm
MD5
SHA-1
AES
1/7/2010 2
Security solution and architectures.
Implementation
• Hardware
• Software
• Method
Results
Conclusions
1/7/2010 3
1. Security solution & architecture Primary requirements on a successful security
architecture:
Availability
Authentication
Data confidentiality
Integrity
Non-repudiation
4
1. Security solution & architecture Effects of a security method to sensor nodes:
That of primary requirements (Slide 4).
Life time: some methods consume more energy to operate than others.
Operation time: especially with low-hardware of sensor nodes.
1/7/2010 5
1. Security solution & architecture Most of proposed security solutions for WSN
Are copied and adapted
From well-know approaches from Internet-based tech.
New idea?
Not yet outlined the feasibility*
6* SPINS: security protocols for sensor networks, ADRIANPERRIG at al., 2002
2. Implementation Hardware
Btnode sensor node
NutOS
Atmega 128L
Chipcon CC1000 low power radio
Bluetooth.
Connect to PC.
1/7/2010 7
2. Implementation Cryptographic algorithms: MD5 (*) produces a 128-bit hash value
MD5("The quick brown fox jumps over the lazy dog") = 9e107d9d372bb6826bd81d3542a419d6
SHA-1 (*) produces a 160-bit digestSHA1("The quick brown fox jumps over the lazy dog") = 2fd4e1c6 7a2d28fc ed849ee1 bb76e739 1b93eb12
AES (**) is the newest, work with fix data size of 128-bit
Cause De facto standards in current security architectures
There are open sources
8
mp5deep, version 3.5.1 http://md5deep.sourceforge.net/http://csrc.nist.gov/archive/aes/index.html
2. Implementation Main function of test setup
Perform 5 tests:
1/7/2010 9
1. Hashing/encrypting data arrays – size up to 1kb with MD5/SHA-1/AES
2. Hashing/encrypting data array of 1kb with MD5/SHA-1/AES while ChipconCC1000-Enabled/idle-Enabled/receiving message-Disable.
3. Hashing array of different size with MD5 while Chipcon CC1000 is enabled, idled.
4. Hashing 1kb with MD5 while measuring battery voltage.
5. Hashing 1kb with MD5 while using Bluetooth.
3. Results1. Hashing/encrypting data arrays – size up to 1kb with
MD5/SHA-1/AES
1/7/2010 10
Fig 1. Hashing arrays of different size with MD5 and SHA-1
Fig 2. Hashing arrays of differentsize with AES
3. Results2. Hashing/encrypting data array of 1kb with MD5/SHA-
1/AES while using Chipcon CC1000.
1/7/2010 11
Fig 3. Hashing 1024 byte of data with MD5 while using Chipcon radio
Fig 5. Hashing 1024 byte of data with AES while using Chipcon radio
Fig 4. Hashing 1024 byte of data with SHA-1 while using Chipcon radio
3. Results3. Hashing array of different size with MD5 while
Chipcon CC1000 is enabled, idled.
1/7/2010 12
Fig 7. Hashing array of difference size with MD5 while Chipcon radio is idle
3. Results4. Hashing 1kb with MD5 while measuring battery
voltage.
1/7/2010 13
Fig 8. Hashing array of difference size with MD5 while measuring the battery voltage
3. Results5. Hashing 1kb with MD5 while using Bluetooth.
1/7/2010 14
Fig 9. Hashing 1024 byte of data with AES while sending data via the Bluetooth system.
4. Conclusions The paper produced statistical results by measure
implementations.
Analyzed cryptographies consume remarkable execution time (AES on 1kb consume 1.67s). Network operation needs multi-operation total consume time??
Those statistics could be used for our validation when implementation or calibrate a simulation program.
1/7/2010 15