Ayush SNEP Ppt | Wireless Sensor Network | Cryptography

A Seminar on

Presented by

Ayush Ranjan
B.E Comp. 2 Roll No. - 02

Under the Kind Guidance of

Prof. S.B. Vanjale

Introduction to Sensor Networks. Need of Security 0n Sensor Networks Sensor Hardware. Is Security on Sensors Possible?. Requirements for Sensor Network Security. Sensor Network Security Building Blocks Implementation and Evaluation. Conclusion.

otion or pollutants. . pressure. sound.WIRELESS SENSOR NETWORK  A wireless sensor network (WSN) consists of spatially distributed autono ous sensors to cooperatively onitor physical or environ ental conditions. such as te perature. vibration.

each node is e uipped unications device. ‡ Now used in ilitary applications such as battlefield any industrial and civilian application areas: ‡ Machine health onitoring ‡ Industrial process onitoring and control ‡ Environ ent and habitat ‡ Traffic control onitoring .‡ In addition to one or ore sensors. ‡ Initially otivated by surveillance. a s all with a wireless co icrocontroller and an energy source (Battery).

‡ Without security. we envision wireless sensor networks being used for e ergency and life-critical syste s and here the uestions of security are fore ost. uch research has focused on aking sensor networks feasible and useful. third parties can read or ta per with sensor data.NEED OF SECURITY ON SENSOR NETWORK ‡ As sensor networks edge closer towards wide-spread deploy ent. security issues beco e a central concern. and has not concentrated on security. ‡ In the future. ‡ So far. .

devices that co which in turn is connected to an outside network. ‡ The current prototype consists of nodes. researchers are building prototype networks of s all sensor devices under the S artDust progra . s all battery powered unicate with a ore powerful base station.SENSOR HARDWARE ‡ At UC Berkeley. .

8-bit. 4 MHz 8KB Instruction Flash 512 bytes RAM 512 bytes EEPROM 916 MHz Radio 10 Kilobits per Second 3500 bytes 4500 bytes TinyOS STORAGE Communication Bandwidth OS Code Space Available Code Space Operating System .Table su CPU arizes the perfor ance characteristics of these devices.

It is intended to be incorporated into s artdust. or vibration. or devices that can detect light. te perature. robots.TinyOS is an e bedded operating syste written in the nesC progra ing language as a set of cooperating tasks and processes. Smartdust is a hypothetical wireless network of tiny icroelectro echanical sensors (MEMS). .

Is Security on Sensors Possible? ‡ Tight constraints ake it i practical to use the current secure algorith s. esearchers have i ple ented all of these pri itives Their easure ents show that adding security to a highly resource-constrained sensor network is feasible. ajority of the ‡ For exa ple. . the working e ory of a sensor node is insufficient etric to even hold the variables that are re uired in asy cryptographic algorith s ‡ But.

 Data Authentication : Data authentication allows a receiver to verify that the data really was sent by the clai ed sender. .REQUIREMENTS FOR SENSOR NETWORK SECURITY  Data Confidentiality : A sensor network should not leak sensor readings to neighboring networks.

. Data Integrity: Data integrity ensures the receiver that the received data is not altered  Data Freshness: Data freshness i plies that the data is recent. and it ensures that no adversary replayed old essages.

µTESLA .SENSOR NETWORK SECURITY BUILDING BLOCKS ‡ To achieve the security re uire ents the researchers have designed and i ple ented two security building blocks: 1. 2. SNEP (Sensor Network Security Protocol).

‡ It has low co essage only. replay protection.SNEP provides a nu ber of uni ue advantages. and essage freshness. ‡ It also gives us data authentication. adds 8 bytes per ‡ It achieves even se antic security. . unication overhead.

.  The counter value is incre ented after each essage.Semantic security: A strong security property which prevents eavesdroppers fro inferring the essage content fro the encrypted essage. the sa e essage is encrypted differently each ti e.

Without counter value an adversary could easily replay essages. . Message freshness:  If the essage is verified correctly.Replay protection:  The counter value prevents replaying old essages. a receiver knows that the essage ust have been sent after the previous essage it received correctly and this enforces a essage ordering and provides essage freshness.

. ‡ Without authenticated broadcast any co pro ised receiver could forge essages fro the sender. ‡ µTESLA uses asy etric echanis through a delayed etric keys.µTESLA is a new protocol which provides authenticated broadcast for severely resource-constrained environ ents. which results in an efficient disclosure of sy broadcast authentication sche e.

‡ When a node gets a packet.‡ µTESLA re uires that the base station and nodes are loosely ti e synchronized. ‡ To send an authenticated packet. it can verify that the corresponding MAC key was not yet disclosed by the base station ‡ The node stores the packet in a buffer . the base station si ply co putes a MAC on the packet with a key that is secret at that point in ti e.

the i ple entation of the cryptographic pri itives is a ajor challenge. ‡ A hard constraint is the e ory size: The sensor nodes have 8 KBytes of read-only progra e ory.IMPLEMENTATION Due to the tight resource constraints of the sensor nodes. and 512 bytes of AM ‡ To save progra e ory we i ple ent all cryptographic pri itives fro single block cipher .

and does not ‡ Using RC5 helps in achieving an additional 40% reduction in code size. .Block cipher: ‡ RC5 is used because of its s all code size and high efficiency. ultiplication. ‡ It does not rely on re uire large tables.

the sa e function is used for both encryption and decryption.Encryption function: ‡ To save code space. .

I ple entation of µTESLA protocol uses another 574 bytes. Together. the crypto library and the protocol i ple entation consu e about 2 KBytes of progra e ory . Energy costs and communication overheads.EVALUATION Evaluation of the implementation of the protocols is done in terms of Code size. Performance. Code size: The s allest version of the crypto routines occupies about 20% of the available code space.

. Energy Cost: Most Energy costs will co e fro extra trans issions re uired by the protocols but we use a strea cipher for encryption.Performance: The perfor ance of the cryptographic pri itives is ade uate for the bandwidth supported by the current generation of network sensors.

it is believed that security syste s can beco e an integral part of practical sensor networks. The design is Universal and can be easily applied to all sensor networks. are low and With these techni ues. The co co putation costs of cryptography unication costs are also s all. .CONCLUSION Security protocols for sensor networks are feasible and can be successfully i ple ented on a sensor network.

.Thank You«.

Questions .

Sign up to vote on this title
UsefulNot useful