User Authentication Using Colors and Data Security Using Armstrong Numbers for Wireless Sensor...
description
Transcript of User Authentication Using Colors and Data Security Using Armstrong Numbers for Wireless Sensor...
User Authentication using Colors and datasecurity using Armstrong numbers for
Wireless Sensor NetworksPresented by
Sachin B. Deshmukh9970406068
Guided byProf. SONKAR S.K.
Security requirement
1]Availability2] Authorization3] Authentication4] Confidentiality5] Integrity6] Non-repudiation
Armstrong Number
If sum of cubes of each digit of thenumber is equal to the number itself, thenthe number is called an ARMSTRONGNUMBER.eg:153=(1*1*1)+(5*5*5)+(3*3*3).
If sum of cubes of each digit of thenumber is equal to the number itself, thenthe number is called an ARMSTRONGNUMBER.eg:153=(1*1*1)+(5*5*5)+(3*3*3).
System Model
1] RGB Based Authenticationa] RGB Color Cubeb] User registrationc] User Authentication on Login
2] Data Security3] AES4] MD5
The AES Cipher
Add round key
Substitute bytes
Shift rows
Mix columns
Add Round key
Substitute bytes
Shift rows
Mix columns
Add round key
Substitute bytes
Shift rows
Add round key
plaintext
Cipher text
keyW[4,7] W[36,39
]W[40,43]
Round 1
Round 9
3.AES Algorithm
The AES Inverse Cipher
Add round key
Inv. Shift rows
Inv. Sub bytes
Add round key
Inv. Mix Columns
Inv. Shift rows
Inv. Sub bytes
Add round key
Inv. Mix columns
Inv. Shift rows
Inv. Sub bytes
Add round key
ciphertext
plaintext
keyW[36,39]
W[4,7] W[0,3]
Round 1
Round 9
1.Sub byte transformation2.Shift row transformation3.mixcolumn transformation4.AddRound key transformation
Operation of AES
State
[0,0]
State
[0,1]
State
[0,2]
State
[0,3]
State
[1,0]
State
[1,1]
State
[1,2]
State
[1,3]
State
[2,0]
State
[2,1]
State
[2,2]
State
[2,3]
State
[3,0]
State
[3,1]
State
[3,2]
State
[3,3]
State
[0,0]
State
[0,1]
State
[0,2]
State
[0,3]
State
[1,1]
State
[1,2]
State
[1,3]
State
[1,0]
State
[2,2]
State
[2,3]
State
[2,0]
State
[2,1]
State
[3,3]
State
[3,0]
State
[3,1]
State
[3,2]
Shift Row
1.Shift Row
47 40 A3 4C
37 D4 70 9F
94 E4 3A 42
ED A5 A6 BC
AC
19 28 57
77 FA D1 5C
66 DC
29 00
F3 21 41 6A
EB 59 8B 1B
40 2E A1 C3
F2 38 13 42
1E 84 E7 D2
3.Add Round Key
MD stands for message digest.
MD5 is an algorithm which: takes an input of any length outputs a message digest of a fixed length (128bit, 32 characters)
MD5 uses the same algorithm every time. Hence itwill always generate the same message digest for thesame string (data).
4.MD5
Security Analysis1)Level1
i)POS_NEW is never sent as plain number,rather its hash is sent.
2)Level 2i)Attacker cannot simply steal H[POS_NEW] and
send (i.e.replay attack), because that becomesobsolete. Attacker will have to guess the nextH[POS_NEW].
ii)POS_NEW = f(POS, SEED)iii)SEED is never sent on wireiv)Larger the SEED length, harder to guess
1)Level1i)POS_NEW is never sent as plain number,
rather its hash is sent.2)Level 2
i)Attacker cannot simply steal H[POS_NEW] andsend (i.e.replay attack), because that becomesobsolete. Attacker will have to guess the nextH[POS_NEW].
ii)POS_NEW = f(POS, SEED)iii)SEED is never sent on wireiv)Larger the SEED length, harder to guess
Advantages1]Usage of colors as a password in this way ensures moresecurity to the data providing authentication.2] The above technique involves keys with a minimum lengthof 8 bits for Armstrong numbers. This minimum key lengthreduces the efforts taken to encrypt the data. The key lengthcan be increased if needed, with increase in character length.This increases the complexity thereby providing increasedsecurity.3] The key can be hacked only if the entire steps involved inthe encoding process is known earlier.
1]Usage of colors as a password in this way ensures moresecurity to the data providing authentication.2] The above technique involves keys with a minimum lengthof 8 bits for Armstrong numbers. This minimum key lengthreduces the efforts taken to encrypt the data. The key lengthcan be increased if needed, with increase in character length.This increases the complexity thereby providing increasedsecurity.3] The key can be hacked only if the entire steps involved inthe encoding process is known earlier.
Conclusion
In this seminar, I propose a user authentication schemefor wireless sensor network named RGB based authenticationscheme. This scheme provides sufficient security for sensornodes having less processing capability.
In this seminar, I propose a user authentication schemefor wireless sensor network named RGB based authenticationscheme. This scheme provides sufficient security for sensornodes having less processing capability.
[1] Shakera Shaikh, Veena Gulhane "User Authentication using Colors and datasecurity using Armstrong numbers for Wireless Sensor Networks".(IJITEE) ISSN:2278-3075, Volume-1, Issue-1, June 2012[2] Ismail Butun and Ravi Sankar,2011, Advanced Two Tier User AuthenticationScheme for Heterogeneous Wireless Sensor Networks.2nd IEEE CCNC ResearchStudent Work-shop[3] X.H. Le, S. Lee, and Y.K. Lee,Two-Tier User Authentication Scheme for Hetero-geneous Sensor Networks. the 5th IEEE International Conference on DistributedComputing in Sensor Systems, (DCOSS 09),Marina Del Rey, California, USA, June 8-10,2009[4] K.H.M.Wong, Y. Zheng, J. Cao, and S.Wang,A dynamic user authentication schemefor wireless sensor networks. IEEE International Conference on Sensor Networks,Ubiq-uitous, and Trustworthy Computing, 2006[5] H.R. Tseng, R.H. Jan, and W. Yang,An Improved Dynamic User Authentica- tionScheme for Wireless Sensor Networks. IEEE Global Communications Conference,(GLOBECOM 2007), USA, November 2007, pp. 986-990
References