Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ UPCommons. Portal de...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Publikationer från KTH
Bachelor thesis . 2013
versions View all 6 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Efficient Key Generation and Distribution on Wireless Sensor Networks

Generación y distribución eficiente de claves para Wireless Sensor Networks
Authors: Ariño Pérez, Víctor;

Efficient Key Generation and Distribution on Wireless Sensor Networks

Abstract

[ANGLÈS] Wireless Sensor Networks have become popular during the last years. The introduction of IPv6 which broadened the address space available, IEEE802.15.4 and adaptation layers such as 6loWPAN have allowed the intercommunication of small devices. These networks are useful in many scenarios such as civil monitoring, mining, battlefield operations, as well as consumer products. Hence, practical security solutions for the intercommunication must be provided, ensuring privacy, authenticity, integrity and data freshness. In most cases, WSN nodes are not tamper-proof and have very limited available resources and capabilities which makes PKI currently not attractive for this environment. At the same time, key pre-distribution provide too low security for most applications. Therefore, the communication bootstrapping or the key generation and distribution problem is an important concern to be addressed with the additional difficulty of the constrained capabilities of WSN nodes. In this thesis, a solution to this problem is described. It makes use of ECDH and the curve K-163 for key exchange, AES- CCM-128 for symmetric encryption to lower the processing overhead and a partial challenge solving chain as well as a TAS to provide strong authentication. Several hash functions have been analysed as well as several random number generating approaches. At the same time, in order to fit the key generation and distribution algorithms together with the regular sensor operation, code optimizations were carried out on the cryptographic library Relic-Toolkit, reducing the memory footprint in 4KB; code reductions on Contiki OS allowed it to run using only 18KB of flash; and the peripheral drivers developed for the CC430 reduced as well the computation time. The solution allows to generate and distribute the keys in situ and is proved to be resilient to most adversaries while taking into account scalability, portability, energy consumption and making it suitable for consumer applications.Wireless Sensor Networks have become popular during the last years. The introduction of IPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as 6loWPAN have allowed the intercommunication of small devices. These networks are useful in many scenarios such as civil monitoring, mining, battlefield operations, as well as consumer products. Hence, practical security solutions for the intercommunication must be provided, ensuring privacy, authenticity, integrity and data freshness. In most cases, WSN nodes are not tamper-proof and have very limited available resources and capabilities which makes PKI currently not attractive for this environment. At the same time, key pre-distribution provide too low security for most applications. Therefore, the communication bootstrapping or the key generation and distribution problem is an important concern to be addressed with the additional difficulty of the constrained capabilities of WSN nodes. In this thesis, a solution to this problem is described. It makes use of ECDH and the curve K-163 for key exchange, AES- CCM-128 for symmetric encryption to lower the processing overhead and a partial challenge solving chain as well as a TAS to provide strong authentication. Several hash functions have been analysed as well as several random number generating approaches. At the same time, in order to fit the key generation and distribution algorithms together with the regular sensor operation, code optimizations were carried out on the cryptographic library Relic-Toolkit, reducing the memory footprint in 4KB; code reductions on Contiki OS allowed it to run using only 18KB of flash; and the peripheral drivers developed for the CC430 reduced as well the computation time. The solution allows to generate and distribute the keys in situ and is proved to be resilient to most adversaries while taking into account scalability, portability, energy consumption and making it suitable for consumer applications.

[CASTELLÀ] Las redes de sensores (WSN) se han vuelto populares durante los últimos años. La aparición de IPv6, ampliando el espacio de direcciones disponible, de IEEE802.15.4 y de capas de adaptación como 6loWPAN permiten la intercomunicación de dispositivos pequeños. Estas redes son útiles en escenarios como monitorización civil, la minería o en operaciones en el campo de batalla; pero también para productos comerciales. Por ello, deben de proporcionarse soluciones de seguridad realizables, que asegurent privacidad, autenticidad, integridad y actualidad de los datos. En la mayoría de casos, los nodos de una WSN no están protegidos de la manipulación física y tienen reducidos recursos disponibles. Esto hace que los sistemas PKI no sean atractivos en estos medios. Al mismo tiempo la pre-distribución de claves ofrece un nivel de seguridad demasiado bajo para la mayoría de aplicaciones. Por este motivo, el establecimiento de la comunicación segura (ó problema de la generación y distribución de claves) es una importante preocupación a ser abordada en conjunción con las limitadas habilidades de los nodos WSN. En esta tesis, se describe una solución al problema descrito. Se hace uso de ECDH y la curva K-163 para el intercambio de claves; AES-CCM-128 para cifrado simétrico (lo cual minimiza el overhead de procesamiento); y de cadenas de resolución parcial de retos conjuntamente con un TAS para garantizar autenticación fuerte. Varios algoritmos de hash y generadores de números aleatorios han sido analizados. Al mismo tiempo, con tal de encajar la generación y distribución de claves junto con la operativa normal de un sensor, se han realizado optimizaciones en la librería criptográfica Relic-Toolkit, reduciendo el impacto de memoria en 4KB; se ha reducido la memoria requerida por Contiki OS permitiendo su ejecución en tan sólo 18KB de flash; y se han desarrollado drivers para periféricos de un CC430 reduciendo los tiempos de computación sensiblemente. La solución propuesta permite la generación y distribución de claves in-situ y ha probado ser resistente a la mayoría de adversarios propuestos al mismo tiempo que se tiene en cuenta la escalabilidad, portabilidad y consumo energético, haciéndola adecuada para su uso en aplicaciones comerciales.

[CATALÀ] Les xarxes sensorials (WSN) s'han tornat populars durant els últims anys. L'aparició de l'IPv6, ampliant l'espai de direccionament, de l'IEEE802.15.4 i de capes d'adaptació com 6loWPAN permeten la intercomunicació de dispositius petits. Aquestes xarxes són útils en escenaris com la monitorizació civil, la mineria o en operacions al camp de batalla; però també per a productes comercials. Per aquest motiu, cal proporcionar solucions de seguretat realitzables que garanteixin privacitat, autenticitat, integritat i actualitat de les dades. A la majoria de casos, els nodes d'una WSN no estan protegits de la manipulació física i tenen reduïts recursos disponibles. Això fa que els sistemes PKI no siguin atractius en aquest entorns. Al mateix temps, la pre-distribució de claus ofereix un nivell de seguretat massa baix per a la majora d'aplicacions. Per aquest motiu, l'establiment de la comunicació segura (o problema de generació i distribució de claus) és una preocupació important que cal abordar en conjunció amb les limitades capacitats dels nodes. En aquesta tesi, es descriu una solució al problema descrit. Es fa ús de ECDH i la corba K-163 per l'intercanvi de claus; d'AES-CCM-128 per al xifrat simètric (el qual minimitza l'overhead de processament); i de cadenes de resolució parcial de reptes conjuntament amb un TAS garantint autenticació forta. Diversos algoritmes de hash i generadors de números aleatoris han estat analitzats. Al mateix temps, per tal d'encaixar la generació i distribució de claus juntament amb la operativa natural d'un sensor, s'ha optimitzat la llibreria criptogràfica Relic-Toolkit, reduint-ne l'impacte de memòria en 4KB; s'ha reduït el requeriment de memòria de Contiki OS permetent-ne l'execució en tan sols 18KB de flash; i s'han desenvolupat drivers per als perifèrics d'un CC430 que han reduït els temps de computació notablement. La solució proposada permet la generació i distribució de claus in-situ i ha demostrat ser resistent a la majoria d'adversaris proposats al mateix temps que s'ha tingut en compte l'escalabilitat, la portabilitat i el consum energètic, fent-la adequada per l'ús en aplicacions comercials.

Projecte realitzat en el marc d’un programa de mobilitat amb la KTH Electrical Engineering

Keywords

:Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC], Seguretat informàtica, Electrical Engineering, Electronic Engineering, Information Engineering, Intercambio de Claves, WSN, Wireless sensor networks, Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors, Computer security, Diffie-Hellman sobre Curvas Elípticas, TCP/IP (Protocol de xarxes d'ordinadors), Pairing, Elliptic Curve Diffie-Hellman, ECDH, Elektroteknik och elektronik, Wireless Security, Key Exchange, Seguridad en Wireless, TCP/IP (Computer network protocol), Xarxes de sensors sense fils

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 27
    download downloads 69
  • 27
    views
    69
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
0
Average
Average
Average
27
69
Green