1 / 83

Contents

Contents. Distributed Sensor Networks (DSNs) Key Predistribution Schemes – KPSs A Set System The 3 phases Metrics for the Evaluation of KPSs Configurations Linear schemes Quadratic schemes Performance comparisons. Contents. Distributed Sensor Networks (DSNs)

helen
Download Presentation

Contents

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  2. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  3. Introduction Distributed sensor networks (DSNs) What are they?

  4. Introduction Distributed sensor networks (DSNs) What are they? What for? Civilian areas Forest fire sensors Sensors of vibrations to predict earthquakes Sensors of chemical substances to discover pollution

  5. Introduction Distributed sensor networks (DSNs) What are they? What for? Civilian areas Forest fire sensors Sensors of vibrations to predict earthquakes Sensors of chemical substances to discover pollution Military applications Collecting images Collecting sounds

  6. Requirements • Accumulate secret information (and relay it to a base station) • Communicate with each other • As small as possible • Consume little power • Encryption

  7. Encryption • Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

  8. Two trivial examples • Every node is given the same secret “master key” • Low Memory costs • Compromise of a single node would render the network completely insecure and unreliable • For every pair of nodes and there is a secret key given only to these 2 nodes • Expensive memory costs • Excellent resiliency (security)

  9. Ways to establish pairwise secret keys • Using public key protocols • Expensive computational costs • Increased storage requirements • Establishing a trusted server that can communicate with all the nodes in the network (like Kerberos) • Expensive costs for message relay • Employing key predistribution schemes (also called KPSs)

  10. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  11. Related Prior Work • Several schemes were proposed for KPS • The schemes we will be discussing closely rely on previous work • We will mention 7 other schemes

  12. The Basic Scheme Developed by Eschenauer and Gligor 3 Parameters: • n number of nodes • k size of key ring • v size of key space Nodes communicate if they have a shared key • Encryption is done using the shared key

  13. The Basic Scheme n can grow greatly even for medium values of v and k

  14. Randomized Keys are chosen by random Key ring assignment is done by random Deterministic Keys are still chosen by random! Key ring assignment is deterministic Basic scheme: Deterministic vsRandomized Key Rings

  15. Basic scheme: Deterministic vsRandomized Key Rings Deterministic No overhead Combinatorial properties are guaranteed. Shared-key discovery and path key establishments can be done in O(1). Randomized Significant overhead in generating good pasudo-random numbers Combinatorial properties are not guaranteed (such as connectivity) Shared-key discovery and path key establishments – O(???)

  16. q Composite Scheme Generalization of the Basic Scheme Two nodes communicate directly if they have at least q common keys • Encryption key is created using all common keys If q=1 then similar to Basic Scheme, yet different

  17. Camtepe and Yener’s Scheme First scheme to use combinatorial designs called Set Systems Blocks and points

  18. 2005 Lee and Stinson’s Scheme Authors of the article Set Systems Linear polynomials over a finite field

  19. Chakrabarti, Maitra, and Roy’s Scheme Start with a certain Set System Form key rings by merging blocks Larger key rings Some performance metrics are improved

  20. Multiple Space Schemes Combine basic KPS (set systems) with older KPS such as Blom[1985] Inner and outer schemes

  21. Multiple Space Schemes Blom [1985]

  22. Hash Chain Schemes Another avenue of research using KPS Good resilience Bad complexity

  23. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  24. A Set System • A set systemis a pair(X,A) • A is a finite set of subsets of X called blocks • The degree of a point is the number of blocks containing x • )X,A) is regular if (of degree r) if all points have the same degree r • The rank of (X,A) is the size of the largest block. • If all blocks have the same size, say k, then (X,A) is said to be uniform (of rank k)

  25. Example X={1,2,3,4,5,6,7,8,9} A={123,456,789,147,258,369 159,267,348,168,249,357}

  26. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  27. The 3 phases There are 3 basic operation that should be implemented: Key predistribution Shared-key discovery Path-key establishment

  28. Key Predistribution Phase Choose n and k input parameters Center creates a uniform and regular set system with rank k and n blocks Center determines q Assignment algorithm What happens if A is just a set of n random k sized blocks?

  29. Shared-Key Discovery phase • The phase in which 2 nodes determine the common points in the 2 blocks assigned to them • Suggestion: node i would broadcast the k points in to each of its neighbors • Suppose that 2 nodes discover that and have exactly t common points : if t>=q then they can establish a secret key

  30. The secret key h is a public key derivation function (such as SHA-1) We are using all the common keys to derive the pairwise key in order to achieve maximum resiliency!

  31. Path-Key Establishment phase • What happens if 2 nodes in wireless communication rage fail to find sufficient number of common keys in the shared-key discovery phase? • They look for multiple secure links (or hops) to reach each other

  32. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  33. Metrics for the Evaluation of KPSs • Network Size (denoted by n) • Key Storage (denoted by k) • Global connectivity • Local connectivity • Resiliency • Complexity of Shared-Key Discovery and Path-Key Establishment

  34. Network Size • The number of nodes in a DSN, which we denote by the parameter n. • The number of nodes is usually between 1,000 and 10,000 nodes (or even higher) • Notice that in some schemes cannot be chosen independently!

  35. Key Storage • The number of keys per node, which we denote by the parameter k • When we use a combinatorial set system as a key ring space, the number of keys per node is equal to the rank of the set system , which is denoted by k

  36. Global Connectivity • The communication capabilities of the network • It is depended on the physical level and the network level • The Physical Level is represented by the physical graph • The Network Level is represented by the block graph • Determined by the structure of the key ring space

  37. They Key-Sharing Graph • It is the intersection between the physical graph and the block graph • We hope that the key sharing graph is connected • We say that the DSN is globally connected if the key sharing graph is a connected graph

  38. Local Connectivity • Refers to the situation where nodes that are physically close to each other can establish a short secure communication path between them • Pr1 – The probability that 2 random nodes share at least q common keys • Pr2 – The probability that 2 nodes in wireless communication range do not share q common keys but there exist a third node that shares q common keys with each of the first 2 nodes

  39. Resiliency • When an adversary captures a number of sensor nodes at random we assume that all the keys of information stored in the nodes are revealed to the adversary. • We want node captures to affect as small a part of the entire network as possible • The resiliency of the network is estimated by fail(s), which is the probability that a link between 2 fixed noncompromised nodes is affected after s other nodes are compromised

  40. Complexity of Shared-Key Discovery and Path-Key Establishment • Shared-Key discovery is often done by having the 2 nodes exchange the list of identifiers of the keys they hold • If the 2 lists are presorted in increasing order of key identifiers then this can be done in time O(k) • By choosing carefully structured key ring space we can obtain an algebraic description of the key rings • In that case we can reduce the computational complexity of shared-key discovery to O(1)!!!

  41. Contents • Distributed Sensor Networks (DSNs) • Key Predistribution Schemes – KPSs • A Set System • The 3 phases • Metrics for the Evaluation of KPSs • Configurations • Linear schemes • Quadratic schemes • Performance comparisons

  42. Configurations We’ll have q=1 for the rest of the discussion (v,n,r,k)-designs Necessary condition for existing configuration nk = vr

  43. LEMMA 1 Any vertex (i.e., block) A j in the block graph GA of a (v, n, r, k)-design, (X,A), has degree at most k(r − 1). Further, all vertices in GA have degrees equal to k(r−1) if and only if |Ai ∩ A j| ≤ 1 for all

  44. Configurations A (v, n, r, k)-design is called a (v, n, r, k)-configuration if any two distinct blocks intersect in zero or one point.

  45. LEMMA 2 Suppose we use a (v, n, r, k)-design for a key ring space with intersection threshold q = 1. Then Pr1 ≤ k(r − 1)/(n − 1). Further, Pr1 = k(r− 1)/(n− 1) if and only if the (v, n, r, k)-design is a configuration.

  46. LEMMA 3 A (v, n, r, k)-configuration exists only if nk = vr and v − 1 ≥ r(k − 1).

  47. Complete Block Graphs The block graph of a configuration is a complete graph if and only if k(r − 1) = n − 1 n << k²

  48. μ-Common Intersection Designs Two-hop paths Increase choices for best-match common neighbor

  49. μ-Common Intersection Designs Suppose that (X,A) is a (v, n, r, k)-configuration. We say that (X,A) is a μ-common intersection design (or (v, n, r, k;μ)-CID) provided that whenever Ai ∩ A j = ∅.

More Related