SPINS-SPINS: Security Protocols for Sensor Networks
#1

Wireless Sensor Networks

A wireless sensor network consists of large Number Of Nodes.Large number of heterogeneous Sensor devices spread over a large field.They perform Wireless sensing and Data Networking. Group of sensors linked by wireless media to perform distributed sensing tasks
Each node has three components: sensing, processing, and communication. Networked sensors can continue to operate accurately in face of failure of individual sensors.Each sensor node operates autonomously with no central point of control in the network. Each node bases its decision on its mission.

SPIN: Sensor Protocols for Information Negotiation

It is one of the most dominant form of routing in the wireless sensor networks.The SPIN protocol names the data using data descriptors or meta data.The nodes use meta data negotiations to eliminate transmission of redundant data in the network. SPIN nodes can base their communication decisions on knowledge of data and resources allowing them to distribute data given limited energy supply.

Advantages of SPIN
negotiation
-SPIN nodes negotiate with each other before transmitting data. This ensures that only the useful information is transferred.
-SPIN uses descriptors called meta data
-Redundant data messages are not sent
-Nodes are able to name the portion of data they are interested in obtaining.

Resource adaptation
-The wireless sensor network nodes poll their resources before data transmission
-Each sensor node had its own resource manager that keeps track of resource consumption
-Nodes are aware of their local energy resources and this enables them to reduce their activities when their energy resources are low
-Nodes monitor and adapt to changes in their own energy resources and thus extend the operating lifetime of the system

SPINS: Security Protocols for Sensor Networks
With thousands to millions of small sensors form self-organizing wireless networks in the future, providing security for these sensor networks is a big issue.
SPINS has two secure building blocks: SNEP(Secure Network Encryption
Protocol) and microTESLA((the micro version of the Timed, Efficient, Streaming, Loss-tolerant Authentication Protocol). SNEP provides the following : Data confidentiality, two-party data authentication, and data freshness. microTESLA provides authenticated broadcast for severely resource-constrained environments.

SPINS SECURITY BUILDING BLOCKS
SNEP:
This provides Data Confidentiality, Authentication, Integrity, and Freshness.
- it has low communication overhead as it adds only 8 bytes per message.The counter state is kept at each end point and does not need to be sent in each message.
-it uses a counter, but avoids transmitting the counter value by keeping state at both
end points.
- It achieves semantic security which prevents eavesdroppers from inferring the
message content from the encrypted message.
- This protocol also provides data authentication, replay protection, and weak message freshness.
To achieve two-party authentication and data integrity, a message authentication code (MAC) is used.
Data authentication: If the MAC(message authentication code) verifies correctly, a receiver
can be assured that the message originated from the claimed sender.

Replay protection: The counter value in the MAC prevents replaying old messages.

Semantic security: the same message is encrypted differently each time.

Weak freshness: If the message verified correctly, a receiver
knows that the message must have been sent after the previous
message it received correctly. Thus it achieves weak freshness.

microTESLA
microTESLA overcomes introduces asymmetry through a delayed disclosure of symmetric
keys, which results in an efficient broadcast authentication
scheme. It requires that the base station and nodes are loosely
time synchronized, and each node knows an upper bound on the
maximum synchronization error. To send an authenticated packet of data,
the base station computes a MAC on the packet with a key
that is secret at that particular point in time. When a node gets a packet, it can
verify that the corresponding MAC key was not yet disclosed by
the base station. Since a receiving node is assured that the MAC key
is known only by the base station, the receiving node is assured that the data was not modified during the sending process. If the key is correct, the node can
now use it to authenticate the packet stored in its buffer.

Full seminar report download:
[attachment=900]
Reply
#2
[attachment=1174]
Reply
#3
please send me detail of this seminar security protocol for sensor network
Reply
#4
Presented By :
Tanu Sharma

[attachment=9866]
SPINS: Security Protocols for Sensor Networks
Sensor Networks are emerging
• Many applications
- Real-time traffic monitoring
- Military applications
- Emergency and critical systems etc.
Need secure communication protocols
• Security for Sensor Networks
• Data Authentication
• Data Confidentiality
• Data Integrity
• Data Freshness
- Weak Freshness
- Partial message ordering, no delay information
- Useful for sensor measurements
- Strong Freshness
- Total ordering on req-res pair, delay estimation
- Useful for time synchronization
Challenge: Resource Constraints
• Limited energy
• Limited computation(4MHz 8-bit)
• Limited memory(512 bytes)
• Limited code size(8 Kbytes)
• Limited communication(30 byte packets)
• Energy consuming communication
Contributions
• SNEP
-Sensor Network Encryption Protocol
-Secures point-to-point communication
• µTESLA
-Micro Timed Efficient Stream Loss-tolerant Authentication
-Provides broadcast authentication
System Assumptions
Communication patterns

-Node to base station (e.g. sensor readings)
-Base station to node (e.g. specific requests)
-Base station to all nodes
• Base Station
-Sufficient memory, power
-Shares secret key with each node
• Node
-Limited resources, limited trust
• Notation
• SNEP
• Data Confidentiality (Semantic Security )
• Data Authentication
• Replay Protection
• Weak Freshness
• Low Communication Overhead
Key Generation /Setup
• Nodes and base station share a master key pre-deployment
• Other keys are bootstrapped from the master key:
– Encryption key
– Message Authentication code key
– Random number generator key
• Authentication, Confidentiality
• Without encryption can have only authentication
• For encrypted messages, the counter is included in the MAC
• Base station keeps current counter for every node
• Strong Freshness
• Counter Exchange Protocol
• Bootstrapping counter values
• µTESLA : Authenticated Broadcast
• TESLA : efficient source authentication in multicast for wired networks.
Problems with TESLA
-Digital Signature for initial packet authentication
µTESLA uses only symmetric mechanism
-Overhead of 24 bytes per packet
µTESLA discloses key once per epoch
-One way key chain is too big
µTESLA restricts number of authenticated senders
Key Setup
• Main idea: One-way key chains
• K0 is initial commitment to chain
• Base station gives K0 to all nodes
• mTESLA Properties
• Asymmetry from delayed key disclosure
• Self-authenticating keys
• Requires loose time synchronization
• Low overhead (1 MAC)
- Communication (same as SNEP)
- Computation (~ 2 MAC computations)
• Independent of number of receivers
Applications
• Authenticated Routing
• Node to Node Agreement
A B: NA, A
B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B)
S A: {SKAB}KSA , MAC(K’SA,NA || A || {SKAB}KSA )
S B: {SKAB}KSB , MAC(K’SB,NB || B || {SKAB}KSB )
Related Work in Broadcast Authentication
• Symmetric schemes
- Link-state routing updates
- Multi-MAC
• Asymmetric schemes
- Merkle hash tree
• Chained hashes
- EMSS
• Hybrid schemes
-Stream signature
-K-times signature
Discussion: Drawbacks
• The mTESLA protocol lacks scalability
- require initial key commitment with each nodes, which is very communication intensive
• SPINS uses source routing, so vulnerable to traffic analysis
Discussion: Risks Un-addressed
• Information leakage through covert channels
• No mechanism to determine and deal with compromised nodes.
• Denial of service attacks
• No Non-repudiation
Conclusion
• Strong security protocols affordable
- First broadcast authentication
• Low security overhead
- Computation, memory, communication
• Apply to future sensor networks
-Energy limitations persist
-Tendency to use minimal hardware
• Base protocol for more sophisticated security services
Reply
#5

to get information about the topic SPINS- Security Protocol for Sensor Networks full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-spins-secur...work--1746

http://studentbank.in/report-spins-spins...r-networks

http://studentbank.in/report-spins-spins...0#pid39690
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: spins car hire, earth spins clockwise, project on security in large networks using mediator protocols, the spins, efficient location training protocols for heterogeneous sensor and actor networks ppt, thread spins spins security protocols for sensor networks, seminar report on spins,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,498 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 42,403 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,467 07-10-2016, 09:02 AM
Last Post: ijasti
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,160 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,823 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,564 26-02-2015, 08:03 PM
Last Post: Guest
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,139 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,917 30-03-2014, 04:40 AM
Last Post: Guest
  Hardware for image processing - Basics Eye – Human vision sensor ppt computer topic 0 7,763 25-03-2014, 11:12 PM
Last Post: computer topic
  Shallow Water Acoustic Networks (SWANs project report helper 2 1,856 24-03-2014, 10:10 PM
Last Post: seminar report asees

Forum Jump: