Applied cryptography project 2
Download
1 / 15

Applied cryptography Project 2 - PowerPoint PPT Presentation


  • 196 Views
  • Updated On :

Applied cryptography Project 2. A demo. Chat server registration Please enter a login name : > Alice Please enter the certificate file name: > c:\cert.cer Congratulations Alice! You have registered with the chat server <terminate program> Logging into the server

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Applied cryptography Project 2' - eamon


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

A demo l.jpg
A demo

Chat server registration

Please enter a login name :

> Alice

Please enter the certificate file name:

> c:\cert.cer

Congratulations Alice! You have registered with the chat server

<terminate program>

Logging into the server

Please enter login name:

> Alice

<challenge response>

Welcome Alice!

<Display contact list>

CSE539 Applied Cryptography- 2005


A demo3 l.jpg
A demo

Alice

Bob

  • Add Contact

  • Chat

  • Enter your choice:

> 1

Enter contact name:

Bob

Bob has been successfully added to you contact list

Alice has added you to her contact list

  • Add Contact

  • Chat

  • Enter your choice:

> 2

Enter contact name:

Bob

Alice : Hi Bob

Bob: Hello

Alice: Hi Bob

Bob: Hello

CSE539 Applied Cryptography- 2005


Sensor network security l.jpg

Sensor Network Security

Prepared by:

Smitha Satish

For CSE 539 ‘05


What is a sensor network l.jpg
What is a sensor network?

  • Consists of spatially distributed sensors

  • Sensors work cooperatively

  • Used to monitor or detect phenomena at a particular location

  • Sensor node has sensing, data processing and communication components

  • Resource constrained, limited battery

CSE539 Applied Cryptography- 2005


Applications of sensor networks l.jpg
Applications of sensor networks

  • Environmental monitoring – great duck island

  • Video surveillance

  • Traffic monitoring

  • Air traffic control

  • Robotics

  • Cars

  • Home monitoring

  • Industrial and manufacturing automation.

CSE539 Applied Cryptography- 2005


Security in sensor networks l.jpg

Sensors

Communication link between sensors

Control Node NodeNode

Insecure Communication links

Internet

Base Station

Security in sensor networks

  • Bio sensor networks with security requirements

  • Data confidentiality

  • Data authentication

  • Data availability

  • Data integrity

  • Data Freshness

CSE539 Applied Cryptography- 2005


Sensor node characteristics l.jpg
Sensor node characteristics

  • Vulnerability of nodes to physical capture

  • Lack of a-priori knowledge of post-deployment configuration

  • Lower battery

  • Limited memory resources

  • Limited bandwidth and transmission power

  • Impracticality of public key cryptosystems

CSE539 Applied Cryptography- 2005


Attack model l.jpg
Attack model

  • Eavesdropping

  • Loss of privacy of sensed data

  • Denial of service

  • Sensor node compromise

CSE539 Applied Cryptography- 2005


Aspects of sensor network security l.jpg
Aspects of sensor network security

  • Cryptography

  • Key management

  • Secure routing

  • Location aware routing

  • Secure data integration

CSE539 Applied Cryptography- 2005


Key distribution requirements l.jpg
Key distribution - requirements

  • Secure node-to-node communication

  • Addition of legitimate nodes

  • Prevent unauthorized nodes

  • No prior knowledge of deployment

  • Low computational and storage requirement

CSE539 Applied Cryptography- 2005


Single network wide key l.jpg
Single network wide key

Use shared network wide key and bootstrap pair-wise keys and append a MAC

Advantages:

  • Minimal storage requirements

  • No need for key exchange or discovery

  • Only symmetric encryption can be used

  • Resistant to DoS

    Disadvantages:

  • Single node compromise leads to network compromise

CSE539 Applied Cryptography- 2005


Pre deployed pair wise key l.jpg
Pre-deployed pair-wise key

  • Every node shares unique symmetric key with every other node

    Advantages:

    • Resilience to node capture

    • Compromised keys can be revoked

    • No need for key exchange or discovery

    • Only symmetric encryption can be used

      Disadvantages:

    • High storage requirements

    • No scalability

CSE539 Applied Cryptography- 2005


The one with trent l.jpg
The one with Trent

  • Sensor nodes authenticate to trusted base station which provides link key to the pair

    Advantages:

    • Resilience to node capture

    • Compromised keys can be revoked

    • Small memory requirement

      Disadvantages:

    • Base station is target for compromise

    • No scalability

    • You need protocols for key exchange or discovery

CSE539 Applied Cryptography- 2005


Asymmetric cryptography l.jpg
Asymmetric cryptography

  • Use asymmetric keys to perform symmetric key exchange

  • Elliptic curve cryptography

    Advantages:

    • Resilience to node capture

    • Compromised keys can be revoked

    • Fully scalable

      Disadvantages:

    • Requires asymmetric key hardware

    • Denial of service

    • Node replication

CSE539 Applied Cryptography- 2005