Conceptual Design Performance Requirements O Efficiency of computation -computation of cryptographic keys and data encryption should be fast O Efficiency of communication protocol -data routing/relay should have low latency a Efficiency of energy -computation and communication tasks for security should not drain the limited power of the sensor nodes a Long network lifetime -networking architecture can be reconfigured
Conceptual Design ❑ Efficiency of computation – computation of cryptographic keys and data encryption should be fast ❑ Efficiency of communication protocol – data routing/relay should have low latency ❑ Efficiency of energy – computation and communication tasks for security should not drain the limited power of the sensor nodes ❑ Long Network lifetime – networking architecture can be reconfigured 11 Performance Requirements
Conceptual Design Security requirements a Data confidentiality -secure channel to prevent information leakage a Data integrity -data should not be altered when transmitted from node to node a Data freshness-data should be up-to-date w/o any replay of old messages a Authentication- verify identity of source a Availability -preserve energy while providing securit a Self organization -robustness to overcome node failures and node compromise
Conceptual Design ❑ Data confidentiality –secure channel to prevent information leakage ❑ Data integrity – data should not be altered when transmitted from node to node ❑ Data freshness – data should be up-to-date w/o any replay of old messages ❑ Authentication – verify identity of source ❑ Availability – preserve energy while providing security ❑ Self organization –robustness to overcome node failures and node compromise 12 Security Requirements
Conceptual Design General idea SINK H Send data back Hierarchical hMSNINaBatraatantissimsmliysibicbyrfihimdfigchitecture What is the optimal way to design robust hierarchical networking architecture to support resource efficient security for HWSNS?
H H Whatis the optimal way to design robust hierarchical networking architecture to support resource efficient security for HWSNs? 13 SINK Flat HWSN: Data transmission by flooding H H Send Data Back HierarchicalHWSN: Data transmission by hierarchical architecture Conceptual Design – General Idea
Conceptual Design Proposed Cluster-based Hierarchical Networking Architecture (CHNetArch) Cluster-head SINK H-node L-node Cluster Robust Networking Self- Formation Reconfiguration Data routing/relay Complete graph
14 H H H H-node SINK L-node H H H H-node SINK L-node H H H Cluster Cluster-head Cluster member H-node SINK L-node H H H Cluster Cluster-head Cluster member H-node SINK L-node Robust Networking Architecture Data routing/relay SelfFormation Reconfiguration Conceptual Design – Proposed Cluster-based Hierarchical Networking Architecture (CHNetArch) Complete graph
Conceptual Design Proposed Secure Communication Scheme Secure Communication Scheme Design Shared Key Ke Secure Cryptographic L-node) Management Routing System Protocol Algorithms member K (L-node) distribution Management Public Key Shared Key cheme Protocol Cryptography Cryptography
15 H-node Clusterhead (L-node) Cluster member (L-node) H-node Shared Key Public key Secure Communication Scheme Design Secure Routing Protocol Key Management System Cryptographic Algorithms Key Predistribution Scheme Key Management Protocol Public Key Cryptography Shared Key Cryptography Conceptual Design – Proposed Secure Communication Scheme