a key management scheme for distributed sensor networks

19
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor

Upload: kellsie

Post on 06-Jan-2016

30 views

Category:

Documents


2 download

DESCRIPTION

A Key Management Scheme for Distributed Sensor Networks. Laurent Eschaenauer and Virgil D. Gligor. Introduction. Constraints Problems with Current Solutions Key Distribution Key Revocation, Re-Keying, and Node Capture Resiliency Analysis and Simulation Problems. Constraints. Power - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Key Management Scheme for Distributed Sensor Networks

A Key Management Scheme for Distributed Sensor Networks

Laurent Eschaenauer and

Virgil D. Gligor

Page 2: A Key Management Scheme for Distributed Sensor Networks

Introduction

Constraints Problems with Current Solutions Key Distribution Key Revocation, Re-Keying, and

Node Capture Resiliency Analysis and Simulation Problems

Page 3: A Key Management Scheme for Distributed Sensor Networks

Constraints

Power Computation Key Transmission Digital Signatures

Storage Space Code Keys

Page 4: A Key Management Scheme for Distributed Sensor Networks

Problems with Current Solutions

Global Keys Compromise Is Drastic

Pair-Wise Keys Storage Problems Inefficiency Re-keying and Node Additions Are

Expensive

Page 5: A Key Management Scheme for Distributed Sensor Networks

Key Distribution Key pre-distribution phase

Preconfigured keys Generation of key pool Randomly chosen sets of keys from key

pool key ring Probability 2 nodes share key is very

high Key identifiers are remembered by

base station, and base station shares key with every node

Page 6: A Key Management Scheme for Distributed Sensor Networks

Key Distribution Cont’d.

Shared key discovery phase Nodes broadcast key identifiers If 2 nodes share a key identifier then

a secure link is set up Links at routing layer are only set up

if a shared key exists Can protect this exchange with a

encrypted challenge

Page 7: A Key Management Scheme for Distributed Sensor Networks

Key Distribution Cont’d.

Path key establishment phase Enables two nodes not sharing a key

to communicate via a multi-hop link Relies on the fact that many keys on

a key ring remain unused after shared key discovery phase

Page 8: A Key Management Scheme for Distributed Sensor Networks

Revocation Revoke keys of a compromised node Base station broadcast a signed

message containing all keys to be removed from key ring

To sign message base station generates new key and unicasts it to each node

Node uses this key to verify signature of revocation message

Page 9: A Key Management Scheme for Distributed Sensor Networks

Re-Keying

Keys may have a lifetime shorter than that of node

Nodes simply remove key from key ring and begin shared key discovery phase again

Page 10: A Key Management Scheme for Distributed Sensor Networks

Node Capture Resiliency

2 threat levels Sensor input manipulation Bogus data Difficult to detect, harder to prevent Data correlation for redundant

sensors Physical Compromise

Tamper-proof construction

Page 11: A Key Management Scheme for Distributed Sensor Networks

Node Capture Resiliency Cont’d.

Automatic key erasure Global key = complete compromise Pair-wise keys = n-1 links to

compromised are available Key distribution scheme = k << n are

compromised

Page 12: A Key Management Scheme for Distributed Sensor Networks

Analysis Probability and Graph Theory

Expected degree of a node to ensure connectivity?

Sizes of key ring, key pool, and network

Page 13: A Key Management Scheme for Distributed Sensor Networks

Analysis Cont’d. Key sharing

probabilities Logarithmic

increase: as network size increases key ring increases logarithmicaly

Page 14: A Key Management Scheme for Distributed Sensor Networks

Simulations Effects on Network Topology

Dependent on size of key ring Multi-hop neighbors can use path only once

Page 15: A Key Management Scheme for Distributed Sensor Networks

Simulations Cont’d.

Page 16: A Key Management Scheme for Distributed Sensor Networks

Simulations Cont’d. Resiliency revisited

Node compromise limits number of links attacker gains access to:

Page 17: A Key Management Scheme for Distributed Sensor Networks

Analysis

Relatively simple operation Complicated staging and pre-

deployment Need to take future into account

when deciding on key-sizes and key-lifetimes.

Achieves relatively low power and computation

Page 18: A Key Management Scheme for Distributed Sensor Networks

Problems No authentication in key discovery phase Open to selective forwarding attack:

Compromised node C tells hears node A tell node B it has key 4. C then tells A it also has key 4. A might then send info to C, and C can drop packets.

Limited since C can’t actually encrypt anything since it doesn’t actually have key 4.

Page 19: A Key Management Scheme for Distributed Sensor Networks

Problems Cont’d.

Compromised node could keep broadcasting a different key identifier list causing neighbors to waste bandwith searching their key list.

Sibyl attack where compromised node repeatedly sends out different key identifier lists. Possibly making a nodes link table grow too large