Enhancing Security in MEMS-based Sensor Networks: Trade-offs and Protocol Recommendations
This paper by Tracy Barger, David Friedman, and Stavan Parikh discusses the security challenges inherent in Microelectromechanical Systems (MEMS) sensor networks. It explores the use of symmetric ciphers and a group key distribution scheme for secure communication among devices. The study emphasizes the balance between security, memory usage, and communication efficiency, suggesting optimal group sizes for node collaboration. Through examining existing security techniques and potential new protocols, the authors highlight the importance of application-specific security measures in the deployment of sensor networks.
Enhancing Security in MEMS-based Sensor Networks: Trade-offs and Protocol Recommendations
E N D
Presentation Transcript
Security in Sensor Networks By: Tracy Barger, David Friedman, and Stavan Parikh
MEMS – Microelctromechanical Systems Swarms ?? • Group Behavior Bees ! • MEMS (Smart Dust) • Applications • Surveillance • Smart House • Grocery Shopping • FedEx tracking on Steroids
Environment Constraints • Power • Processor: 8 bit • Memory: 15K • RAM: 512 bytes • Devices not individually addressable
Trust Model • Base Station • Complete Trust • Requires Authentication • Motes • Trust Self • Broadcast Communication: Insecure • Need Encryption
Key Distribution and Encryption • Use symmetric cipher • Keys pre-initialized in motes • Use J-secure scheme (NAI Paper) • n nodes, y groups • All nodes in a group have same key K1 K2 Note: If security is a priority, keys can be refreshed using a group key distribution scheme such as key graphs
Group Size Tradeoffs 1 n s • What’s optimal group size? • s = group size • Tradeoff:security v. # communications v. memory • Small, one-hop -- Use s = 1
Hash-based Authentication Generates Xn; Calculates key Chain: H(Xn) = X n-1… H(X1)= X0 M = E(Command || Xi) Mote decrypts M, Checks H(Xi) = Xi-1 Then stores Xi in place of Xi-1
Conclusion • Examined current security techniques • Key Distribution • Authentication • Tradeoff between modifying existing and starting from scratch • May be more beneficial to create new protocols • Security will be defined by application