DigitalNachhaltigF: Elektrotechnik und MedientechnikI: Institut ProtectITBeitrag (Sammelband oder Tagungsband)
Michael Heigl, Laurin Dörr, Martin Schramm, D. Fiala
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (July 26-28, 2019; Prague, Czech Republic), vol. Vol. 2 (SECRYPT 2019 : 16th International Conference on Security and Cryptography)
2019
DOI: 10.5220/0007835600720083
Abstract anzeigen
For an effective protection of the communication in Wireless Sensor Networks (WSN) facing e.g. threats by quantum computers in the near future, it is necessary to examine the applicability of quantum-resistant mechanisms in this field. It is the aim of this article to survey possible candidate schemes utilizable on sensor nodes and to compare the energy consumption of a selection of freely-available software implementations using a WSN-ready Texas Instruments CC1350 LaunchPad ARM® Cortex®-M3 microcontroller board.
DigitalNachhaltigF: Elektrotechnik und MedientechnikI: Institut ProtectITBeitrag (Sammelband oder Tagungsband)
Laurin Dörr, Michael Heigl, D. Fiala, Martin Schramm
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks
Proceedings of the 2019 International Electronics Communication Conference (IECC '19) [July 7-9, 2019; Okinawa, Japan]
2019
DOI: 10.1145/3343147.3343156
Abstract anzeigen
A Wireless Sensor Network (WSN) contains small sensor nodes which monitor physical or environmental conditions. WSN is an important technology for digitalization of industrial periphery and is often used in environments which are not hardened against security impacts. These networks are easy to attack due to the open communication medium and low computing resources of the applied devices. Establishing security mechanisms is difficult while taking into account low energy consumption. Low cost sensors with limited resources make the implementation of cryptographic algorithms even more challenging. For WSNs cryptographic functions are needed without high impact on energy consumption and latency. Therefore, security in WSNs is a challenging field of research. This paper compares lightweight energy-efficient key exchange protocols which are suitable for WSN. The protocols were also implemented in WSN-capable Texas Instrument boards and the energy consumption was measured during the key exchange. This paper shows that schemes have to be chosen depending on the specific network requirements and that the usage of asymmetric cryptography does not always result in a high energy consumption.
DigitalMobilF: Elektrotechnik und MedientechnikI: Institut ProtectITZeitschriftenartikel
Michael Heigl, Laurin Dörr, Nicolas Tiefnig, D. Fiala, Martin Schramm
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection
Computers & Security, vol. 85, no. August, pp. 270-285
2019
DOI: 10.1016/j.cose.2019.05.010
Abstract anzeigen
The connectivity of embedded systems is increasing accompanied with thriving technology such as Internet of Things/Everything (IoT/E), Connected Cars, Smart Cities, Industry 4.0, 5G or Software-Defined Everything. Apart from the benefits of these trends, the continuous networking offers hackers a broad spectrum of attack vectors. The identification of attacks or unknown behavior through Intrusion Detection Systems (IDS) has established itself as a conducive and mandatory mechanism apart from the protection by cryptographic schemes in a holistic security eco-system. In systems where resources are valuable goods and stand in contrast to the ever increasing amount of network traffic, sampling has become a useful utility in order to detect malicious activities on a manageable amount of data. In this work an algorithm – Uncoupled MAC – is presented which secures network communication through a cryptographic scheme by uncoupled Message Authentication Codes (MAC) but as a side effect also provides IDS functionality producing alarms based on the violation of Uncoupled MAC values. Through a novel self-regulation extension, the algorithm adapts it’s sampling parameters based on the detection of malicious actions. The evaluation in a virtualized environment clearly shows that the detection rate increases over runtime for different attack scenarios. Those even cover scenarios in which intelligent attackers try to exploit the downsides of sampling.
DigitalF: Elektrotechnik und MedientechnikI: Institut ProtectITBeitrag (Sammelband oder Tagungsband)
Michael Heigl, Laurin Dörr, Amar Almaini, D. Fiala, Martin Schramm
Incident Reaction Based on Intrusion Detections’ Alert Analysis
Proceedings of the 23rd International Conference on Applied Electronics (AE) 2018 (University of West Bohemia, Pilsen, Czech Republic; September 11-12, 2018)
2018
DOI: 10.23919/AE.2018.8501419
Abstract anzeigen
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as a fundamental part in holistic security eco-systems in the previous years. However, the interpretation of and reaction on detected incidents is still a challenging task. In this paper an incident handling environment with relevant components and exemplary functionality is proposed that involves the processes from the detection of incidents over their analysis to the execution of appropriate reactions. An evaluation of a selection of implemented interacting components using technology such as OpenFlow or Snort generally proofs the concept.
DigitalF: Elektrotechnik und MedientechnikI: Institut ProtectITBeitrag (Sammelband oder Tagungsband)
Laurin Dörr, D. Fiala, Michael Heigl, Martin Schramm
Assessment simulation model for uncoupled message authentication
Proceedings of the 22nd International Conference on Applied Electronics (AE 2017) [Sep 5-7, 2017; University of West Bohemia, Pilsen, Czech Republic]
2017
DOI: 10.23919/AE.2017.8053580
Abstract anzeigen
Today's trend of an increasing number of networked embedded devices pervades many areas. Ranging from home automation, industrial or automotive applications with a large number of different protocols, low resources and often high demands on real-time make it difficult to secure the communication of such systems. A concept of an uncoupled MAC which is able to ensure the authenticity and integrity of communication flows between two network parties can be used. This is in particular of advance for outdated legacy components still participating in the network. In this paper a assessment simulation model of the mechanism behind this technology is described. It outlines the probability of detecting an attack depending on the message authentication overhead. The model considers all control variables and performs measurements based on random data traffic. The results of the statistical analysis state that a high attack detection rate can be obtained even with a small communication overhead.