29
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley Presented By: Kimberly Yonce

SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

  • View
    225

  • Download
    4

Embed Size (px)

Citation preview

Page 1: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

SPINS: Security Protocols for Sensor

NetworksAdrian Perrig, Robert Szewczyk,

Victor Wen, David Culler, and J.D. Tygar – University of California,

Berkeley

Presented By: Kimberly Yonce

Page 2: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Outline Wireless Sensor Networks SPINS Building Blocks

SNEP TESLA

Related Work Limitations/Future Work/Comments

Page 3: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Wireless Sensor Networks (WSN) A wireless network

consisting of spatially distributed autonomous devices using sensors to cooperatively monitor different locations.

Types of Sensors: temperature, sound, vibration, pressure, motion, and light.

Page 4: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

WSN Applications Habitat monitoring

ZebraNet: Animals are equipped with tracking nodes that contain GPS to monitor position and speed of movement and light sensors to indicate current environment.

Page 5: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

WSN Applications Fire Detection

SmokeNet: Sensors monitor smoke detection in a building. Sensors worn by firefighters monitor heart rate and air tank level as well as their location.

Page 6: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

WSN Applications Medical Uses

Vital Sign Monitoring Patient Tracking Emergency Triage Stroke Rehabilitation

Page 7: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

WSN Applications Military Uses

Military Vehicle Tracking

Mine Fields Sniper Localization

Traffic Monitoring Intrusion Detection

Page 8: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Sensor Network at UC Berkeley

Page 9: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Sensor Hardware

Page 10: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Sensor Hardware SmartDust TinyOS CPU: 8-bit, 4MHz Storage: 8 KB instruction

flash, 512 bytes RAM, 512 bytes EEPROM

916 MHz radio Bandwidth: 10 Kbps OS Code Space: 3500

bytes Available Code Space:

4500 bytes

Page 11: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

WSN Challenges Severely resource-constrained

environments: Processing power Storage Bandwidth Energy

Page 12: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Is Security Possible? RSA

Performs operations on 2 large prime numbers N (modulus of the public and private keys) is

recommended to be at least 2048 bits long Digital Signatures

High communication overhead of 50-1000 bytes per packet

High overhead to create and verify the signatures

Page 13: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Is Security Possible? DES

64 bit block size Key length 56 bits 512-entry Sbox table 256-entry table for various permutations

AES 128 bit fixed block size Key size of 128, 192, or 256 bits 800 bytes of lookup tables

Page 14: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

WSN Communication Patterns Sensor Readings

Node to Base Station Specific Requests

Base Station to Node Reprogramming

Network, Routing Beacons Base Station broadcast

to all Nodes

Page 15: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Sensor Network Security Requirements Data Confidentiality Data Authentication Data Integrity Data Freshness

Weak Freshness Strong Freshness

Page 16: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

SPINS Building Blocks SNEP

Data confidentiality Two-party data authentication Integrity Freshness

TESLA Authentication for data broadcasts

Page 17: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

SNEP Low communication overhead Uses MAC to achieve two-party authentication

and data integrity A shared counter between sender and receiver

helps ensure semantic security

CKmacCK encrencrDCKMACDBA

,,: ,,

Page 18: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

SNEP with Strong Freshness

AA RNBA ,:

CKBAmacCKB encrencrRCNKMACRAB ,, ,,:

Page 19: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

TESLA TESLA authenticates initial packet with a

digital signature. TESLA uses only symmetric mechanisms.

Instead of disclosing a key in each packet, a key is disclosed once per epoch.

TESLA restricts number of authenticated senders.

Broadcast from Base Station vs. Broadcast from a node

Page 20: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Cryptography Implementation Block Cipher

RC5 – small code size and high efficiency Variable block size (32, 64, or 128 bits) Key Size (0 to 255) # of Rounds (0 to 255) Modular additions and XORs Feistal like structure

Page 21: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Encryption Function Counter (CTR) Mode

Same function for encryption and decryption Stream cipher in nature

Page 22: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

MAC Generation

Page 23: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Key Setup

Page 24: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Evaluation Code Size

RAM Requirements

Page 25: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Evaluation Energy Costs

20%1%

1%

1%

7%

2%

71%

MAC Transmission

Encryption Computation

EncryptionTransmissionComputation

Freshness Transmission

MAC Computation

Data Transmission

Page 26: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Related Work Carman, Kruus, and Matt analyze a variety

of approaches for key agreement and distribution in sensor networks.

TEA by Wheeler and Needham or TREYFER by Yuval are smaller alternatives as symmetric ciphers.

Karlof and Wagner investigate security goals for routing in sensor networks.

Deng et al. analyze attacks against the base station.

Page 27: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Limitations/Future Work TESLA requires loose time

synchronization between nodes Counter must be updated at sender and

receiver Information leakage through covert

channels Only ensure that a compromised sensor

does not reveal the keys of all the sensors in the network

Page 28: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Limitations/Future Work Does not consider DoS Does not achieve non-repudiation Relies on the base station being trusted,

and therefore does not consider attacks on the base station itself.

Page 29: SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley

Questions/Comments