User Authentication Using Colors and Data Security Using Armstrong Numbers for Wireless Sensor...

23
User Authentication using Colors and data security using Armstrong numbers for Wireless Sensor Networks Presented by Sachin B. Deshmukh 9970406068 Guided by Prof. SONKAR S.K.

description

Power Point Presentation

Transcript of User Authentication Using Colors and Data Security Using Armstrong Numbers for Wireless Sensor...

User Authentication using Colors and datasecurity using Armstrong numbers for

Wireless Sensor NetworksPresented by

Sachin B. Deshmukh9970406068

Guided byProf. SONKAR S.K.

Security requirement

1]Availability2] Authorization3] Authentication4] Confidentiality5] Integrity6] Non-repudiation

Wireless Sensor Network?

Armstrong Number

If sum of cubes of each digit of thenumber is equal to the number itself, thenthe number is called an ARMSTRONGNUMBER.eg:153=(1*1*1)+(5*5*5)+(3*3*3).

If sum of cubes of each digit of thenumber is equal to the number itself, thenthe number is called an ARMSTRONGNUMBER.eg:153=(1*1*1)+(5*5*5)+(3*3*3).

System Model

1] RGB Based Authenticationa] RGB Color Cubeb] User registrationc] User Authentication on Login

2] Data Security3] AES4] MD5

A.RGB Color Cube

POS of RGB Color = R*65536 + G*256 + B

1.RGB Based Authentication

B] User Registration

8n^2+8n 2n+1 4n4n^2+4n n+1 2n+14n^2+4n+1 n 2n-1

Fig: Armstrong_Matrix

C]User Authentication

2.Data Security

The AES Cipher

Add round key

Substitute bytes

Shift rows

Mix columns

Add Round key

Substitute bytes

Shift rows

Mix columns

Add round key

Substitute bytes

Shift rows

Add round key

plaintext

Cipher text

keyW[4,7] W[36,39

]W[40,43]

Round 1

Round 9

3.AES Algorithm

The AES Inverse Cipher

Add round key

Inv. Shift rows

Inv. Sub bytes

Add round key

Inv. Mix Columns

Inv. Shift rows

Inv. Sub bytes

Add round key

Inv. Mix columns

Inv. Shift rows

Inv. Sub bytes

Add round key

ciphertext

plaintext

keyW[36,39]

W[4,7] W[0,3]

Round 1

Round 9

1.Sub byte transformation2.Shift row transformation3.mixcolumn transformation4.AddRound key transformation

Operation of AES

State

[0,0]

State

[0,1]

State

[0,2]

State

[0,3]

State

[1,0]

State

[1,1]

State

[1,2]

State

[1,3]

State

[2,0]

State

[2,1]

State

[2,2]

State

[2,3]

State

[3,0]

State

[3,1]

State

[3,2]

State

[3,3]

State

[0,0]

State

[0,1]

State

[0,2]

State

[0,3]

State

[1,1]

State

[1,2]

State

[1,3]

State

[1,0]

State

[2,2]

State

[2,3]

State

[2,0]

State

[2,1]

State

[3,3]

State

[3,0]

State

[3,1]

State

[3,2]

Shift Row

1.Shift Row

2.Mix Column Transformation

47 40 A3 4C

37 D4 70 9F

94 E4 3A 42

ED A5 A6 BC

AC

19 28 57

77 FA D1 5C

66 DC

29 00

F3 21 41 6A

EB 59 8B 1B

40 2E A1 C3

F2 38 13 42

1E 84 E7 D2

3.Add Round Key

MD stands for message digest.

MD5 is an algorithm which: takes an input of any length outputs a message digest of a fixed length (128bit, 32 characters)

MD5 uses the same algorithm every time. Hence itwill always generate the same message digest for thesame string (data).

4.MD5

Security Analysis1)Level1

i)POS_NEW is never sent as plain number,rather its hash is sent.

2)Level 2i)Attacker cannot simply steal H[POS_NEW] and

send (i.e.replay attack), because that becomesobsolete. Attacker will have to guess the nextH[POS_NEW].

ii)POS_NEW = f(POS, SEED)iii)SEED is never sent on wireiv)Larger the SEED length, harder to guess

1)Level1i)POS_NEW is never sent as plain number,

rather its hash is sent.2)Level 2

i)Attacker cannot simply steal H[POS_NEW] andsend (i.e.replay attack), because that becomesobsolete. Attacker will have to guess the nextH[POS_NEW].

ii)POS_NEW = f(POS, SEED)iii)SEED is never sent on wireiv)Larger the SEED length, harder to guess

Advantages1]Usage of colors as a password in this way ensures moresecurity to the data providing authentication.2] The above technique involves keys with a minimum lengthof 8 bits for Armstrong numbers. This minimum key lengthreduces the efforts taken to encrypt the data. The key lengthcan be increased if needed, with increase in character length.This increases the complexity thereby providing increasedsecurity.3] The key can be hacked only if the entire steps involved inthe encoding process is known earlier.

1]Usage of colors as a password in this way ensures moresecurity to the data providing authentication.2] The above technique involves keys with a minimum lengthof 8 bits for Armstrong numbers. This minimum key lengthreduces the efforts taken to encrypt the data. The key lengthcan be increased if needed, with increase in character length.This increases the complexity thereby providing increasedsecurity.3] The key can be hacked only if the entire steps involved inthe encoding process is known earlier.

Application

1.Military2.Enviornmental3.Health

Conclusion

In this seminar, I propose a user authentication schemefor wireless sensor network named RGB based authenticationscheme. This scheme provides sufficient security for sensornodes having less processing capability.

In this seminar, I propose a user authentication schemefor wireless sensor network named RGB based authenticationscheme. This scheme provides sufficient security for sensornodes having less processing capability.

[1] Shakera Shaikh, Veena Gulhane "User Authentication using Colors and datasecurity using Armstrong numbers for Wireless Sensor Networks".(IJITEE) ISSN:2278-3075, Volume-1, Issue-1, June 2012[2] Ismail Butun and Ravi Sankar,2011, Advanced Two Tier User AuthenticationScheme for Heterogeneous Wireless Sensor Networks.2nd IEEE CCNC ResearchStudent Work-shop[3] X.H. Le, S. Lee, and Y.K. Lee,Two-Tier User Authentication Scheme for Hetero-geneous Sensor Networks. the 5th IEEE International Conference on DistributedComputing in Sensor Systems, (DCOSS 09),Marina Del Rey, California, USA, June 8-10,2009[4] K.H.M.Wong, Y. Zheng, J. Cao, and S.Wang,A dynamic user authentication schemefor wireless sensor networks. IEEE International Conference on Sensor Networks,Ubiq-uitous, and Trustworthy Computing, 2006[5] H.R. Tseng, R.H. Jan, and W. Yang,An Improved Dynamic User Authentica- tionScheme for Wireless Sensor Networks. IEEE Global Communications Conference,(GLOBECOM 2007), USA, November 2007, pp. 986-990

References