integrating hasafss into r.e.d for node replication detection in wireless sensor networks shajith...
TRANSCRIPT
![Page 1: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/1.jpg)
Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor
Networks
Shajith RaviSchool of EECS - OSU
CS519 - Advanced Network Security
![Page 2: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/2.jpg)
Source Papers
• A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei
• Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks
Attila Altay Yavuz , Peng Ning
![Page 3: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/3.jpg)
Objective
• RED claims to have best routing protocol; energy, memory and computationally efficient
• RED is based on a general PKC system e.g. ECDSA, RSA.
• HaSAFSS claims to be faster than standard PKCs, with just 3 hash operations for a signature generation/verification system.
• Objective : Integrate HaSAFSS into RED
![Page 4: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/4.jpg)
Wireless Sensor Network (WSN)
• What are WSNs?• Unattended?• Applications• Drawbacks• Existing Protocols
![Page 5: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/5.jpg)
![Page 6: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/6.jpg)
Node Replication Attack: an attacker captures a node, clone it and distributes the cloned nodes in the network area. • Cloned nodes could be used by the attacker to
subvert the data aggregation or the decision making if based on some voting mechanism.
![Page 7: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/7.jpg)
RED Protocol
• ID-based PKC• Time synchronized • Two Steps :– Random Value – Detection Phase
![Page 8: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/8.jpg)
Pseudocode
![Page 9: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/9.jpg)
Seed
Random value is the seed. Broadcasted using centralized or distributed mechanism.
![Page 10: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/10.jpg)
Detection Phase
• Each node broadcasts its claim (ID and location). • Each node that hears a claim sends (with probability p) this
claim to a set of g ≥ 1 pseudo-randomly selected network locations. – The pseudo random function takes as an input: ID, rand, g. – Every node in the path (from claiming node to the witness
destination) forwards the message to its neighbor nearest to the destination.
![Page 11: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/11.jpg)
Part 1
![Page 12: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/12.jpg)
Verification to Revocation
![Page 13: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/13.jpg)
HaSAFSS
• Four algorithms:– Key Generation– Forward-secure and aggregate signature
generation– Time Trapdoor Release– Signature Verfication
![Page 14: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/14.jpg)
Key Generation
![Page 15: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/15.jpg)
Time Trapdoor Release
• Synchronous mode– the TTP can release the time trapdoor keys based on a pre-determined
data delivery schedule periodically, without requiring an interaction with the receivers.
• Asynchronous mode– the TTP releases the time trapdoor key if and only if it is requested by
a sufficient number of valid receivers.
![Page 16: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/16.jpg)
Signature Generation
![Page 17: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/17.jpg)
Signature Verification
![Page 18: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/18.jpg)
Part 2 - Verification(Sym HaSAFSS)
![Page 19: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/19.jpg)
Future Work
• Find a way to integrate Sym-HaSAFSS in order to replace a crypto system eg:ECDSA in RED
• Compare and Contrast performance analysis of original algorithm and modified algorithm
![Page 20: Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security](https://reader035.vdocuments.mx/reader035/viewer/2022062721/56649f225503460f94c3a94a/html5/thumbnails/20.jpg)
Thank You !
Questions?