Data Origin Authentication for Specialized NetworkApplication - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Data Origin Authentication for Specialized NetworkApplication

Description:

Verify and ensure the source node. Make secure data transfer in ... Encrypt (Hash) - Signed data. Decrypt (Hash) Public key. Make hash (Data payload) MD5 ... – PowerPoint PPT presentation

Number of Views:70
Avg rating:3.0/5.0
Slides: 14
Provided by: RYUJA
Category:

less

Transcript and Presenter's Notes

Title: Data Origin Authentication for Specialized NetworkApplication


1
Data Origin Authentication for Specialized
Network/Application
  • Jaehyuk Ryu

2
Purpose
  • Problem
  • No origin authentication on sensor network
  • Simple security issues still exist
  • Purpose
  • Verify and ensure the source node
  • Make secure data transfer in specific network
  • Especially security for routing area

3
Introduction Background
  • 99 of implemented sensor network is wired
    network
  • Theres no good application for WSN yet
  • Security issue is not popular because theyre
    implemented like private network
  • Covered by gate node
  • Research of origin authentication
  • Especially for web (SSL)
  • Using public/private key lt- can be heavy load for
    each packet
  • BGP update message (IP layer)
  • Origin authentication is base of security
  • Other cryptography might be meaningful

4
Solution
Use Different Protocol?
New protocol design to deliver hash/sign
Use KEY?
Asymmetric?
Active? Passive?
Num. Type of KEY?
Use delay
of cryptography
Use IP options
Use 3rd party
5
Use Delay Approach
STEP 4
Calculate delay
IP
STEP 2
STREAM With timestamp
STEP 1
T1
T2
Keep Sync With TS
T3
ICMP
T1
STEP 3
T2
T3
ICMP Time Request Random interval
DATA
DATA
DATA
TS
DATA
6
General Method
7
General Method
8
Signed Data Scenario
Data payload
Decrypt (Hash) Public key
Header
Make hash (Data payload) MD5
Data payload
Make hash (Data payload) MD5
Encrypt (Hash) -gt Signed data
Encrypt (Hash) Private key
COMPARE!! -gt O or X
9
For Sensor Network
  • It is still heavy
  • Size, Processing, Maintenance
  • Architecture for sensor network
  • Broadcast based communication
  • Frequent error rate
  • Denial of service
  • Can use location information
  • Based on the application

10
Considerations
  • Physical node capture
  • Performance problem
  • Asymmetric key cryptography is considered too
    heavy
  • TinySEC (TinyOS) supports only access control
    data integrity
  • LEAP protocol proposed privategrouppairwiseclu
    ster key
  • Sensor specific attacks exist
  • Energy attack
  • Routing Security
  • Denial of service attacks

11
Idea of Secure information aggregation
12
Steps
  • Implement general approach
  • Key generation/distribution/signature
  • For local testbed or test machine
  • Check consideration find limitation
  • Find specific network and application for
    research
  • Consideration and requirements

13
Brief Idea
In next report
Write a Comment
User Comments (0)
About PowerShow.com