Upload
korea-university
View
25
Download
4
Tags:
Embed Size (px)
Citation preview
Contents• Introduction
• System Assumptions
• Requirements for Sensor Network Security
• SNEP / Counter Exchanging / µTESLA
• Implementation
• Evaluation
• Question & Answer
Introduction
Limited Processing Power
Limited Storage
Low Bandwidth
Inefficient Energy
Sensors will have..
SPINS
Data Confidentiality !
Two-party Data Authentication !
Integrity !
Evidence of Data Freshness
Authenticated Broadcast for Resource-constrained
Environments
SNEP µTESLA
NodeBaseStation NodeNode
Communication arch.
e.g., routing beacons, queries, reprogramming..
Node
Node
Node
SNEP(with weak freshness)
Semantic security
Data authentication
Replay protection
Low communication overhead
FreshnessFreshness
Implementation
• subset of RC5
• CTR Encryption Function
• used Nonce
• use MAC for PRG
• compute MAC per packet