Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.

Similar presentations


Presentation on theme: "Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015."— Presentation transcript:

1 Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015

2 Outlines…… ► Introduction ► WSN Security ► Why, different from traditional network ? ► Seven Categories of security issues ► Existing Research in WSN ► Spins ► TinySec ► TinyPK ► Motivation for Security at Link Layer 210/28/2015

3 Introduction: WSN ► A WSN is a network made of many small devices consisting of: ► Battery, ► Radio Communication, ► Microcontroller and sensors. Wireless Sensor Network 310/28/2015

4 Motes…. 4

5 Application of WSN… ► Body Area Sensor Network (BASN):  ECG Sensor  SpO2 & Motion sensor  Motion Sensor 510/28/2015

6 WSN Security ► Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission ► Sensor nodes can be physically captured or destroyed ► Protecting confidentiality, integrity, and availability of the communications and computations 610/28/2015

7 Why Security different from traditional network ? ► Sensor Node Constraints: ► CPU power:  8-bit CPU ► Memory:  Program Storage(Flash) and Working Memory(RAM) ► Battery:  Computational Energy Consumption  Communications Energy Consumption 710/28/2015

8 Security issues are divided in Seven Categories as referenced paper Security issues are divided in Seven Categories as referenced paper ► Cryptography ► Key Management ► Attack Detections and prevention ► Secure Routing ► Secure Location ► Secure Data Fusion ► And other Security issues Reference : Xiangqian Chen, k. Makki, Kang Yen, Niki P.,”Sensor network Security: A Survey”, IEEE communication surveys & Tutorial, Vol. 11, No. 2, Second Quarter 2009. 810/28/2015

9 Existing Research: ► SPINS: Security Protocol for Sensor Network ► SENP:  Sensor-Network Encryption Protocol.  Secures point-to-point communication ►  TESLA:  Micro Timed Efficient Stream Loss-tolerant Authentication  Provides broadcast authentication Reference: Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001 910/28/2015

10 Cont… ► Use simple symmetric encryption function (RC5) provides: ► Encryption & Decryption ► Message Authentication Code ► Pseudorandom number generation ► Hash Function ► TESLA : efficient source authentication in multicast for wired networks. ► µTESLA: authentication in broadcast for WSNs. ►µ TESLA removes or adapts the expensive features of TESLA 1010/28/2015

11 TinySec….. ► Light weight and efficient generic link layer security package. ► Developers can easily integrate into sensor network applications. ► A research platform that is easily extensible and has been incorporated into higher level protocols. Reference: Chris Karlof, Naveen Sastry, David Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004. 1110/28/2015

12 TinySec-Design ► Two Security Options  Authentication Encryption (Tinysec-AE)  Authentication only (Tinysec-Au) ► Encryption :  Specifying the IV format  Selecting an encryption Scheme( CBC) 1210/28/2015

13 TinyPK ► In order to make TinyPK practical, protocol require only public key operations on the sensor. ► TinyPK is based on RSA cryptosystem. ► TinyPK requires a Certificate Authority. ► Any external party that wishes to interact with the node also requires its own Public/private key 1310/28/2015 Reference: TinyPK: Securing Sensor Networks with Public Key Technology”, R. Watro et al., ACM SASN, October 2004.

14 Motivation for Link Layer Security ► End-End security Mechanisms : Suitable only for conventional networks using end-end communications where intermediate routers only need to view the message headers. ► BUT, in Sensor networks In-network processing is done to avoid redundant messages-Requires intermediate nodes to have access to whole message packets and just not the headers as in conventional networks. 10/28/201514

15 Cont… ► Why end-end security mechanisms not suitable for sensor networks? ► If message integrity checked only at the destination, the networks may route packets injected by an adversary many hops before they are detected. This will waste precious energy. ► A link layer security mechanism can detect unauthorized packets when they are first injected onto the network. 10/28/201515

16 Next Plan…. ► Discuss more about related topic. ► Discuss Problems in existing research. 10/28/201516 Any Question ?


Download ppt "Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015."

Similar presentations


Ads by Google