Security Issues in Wireless Sensor Networks (WSNs)

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Aggregated Traffic Flow Weight Controlled Hierarchical MAC Protocol for Wireless Sensor Networks Asia FI School Presented By Md. Abdur Razzaque Kyung.
This Material Will Not be In Final Exam. Cross-Site Scripting (XSS)
Chris Karlof and David Wagner
Juan-Antonio CorderoPhilippe JacquetEmmanuel Baccelli Orlando, FL -- March 29 th, 2012 Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
Security in Mobile Ad Hoc Networks
1 Security for Ad Hoc Networks Hang Zhao. 2 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile.
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
April, 2008, IEEE ISCE Taehong Kim; Sukbin Seo; Chong Poh Kit; Kimseyoo, Y.; Seong-eun Yoo; Daeyoung Kim Experiments on mobile sink application in ZigBee.
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235.
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
25 seconds left…...
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Song Fang, Yao Liu Wenbo Shen, Haojin Zhu 1.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
Wireless Sensor Network Security: A Survey Presented By: Anubhav Mathur Department of Computer Science University of Connecticut Authors: John Paul Walters,
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Sensor Network Security
Ad Hoc Network.
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
A Critical Analysis on the Security of IoTs
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
Security Issues in Wireless Sensor Networks
An Overview of Security Issues in Sensor Network
Presentation transcript:

Security Issues in Wireless Sensor Networks (WSNs) Shayan Zamani & Mojtaba Jafari Mazanadaran University of Science and Technology, Distributed Systems Class Seminar, Supervisor: Hadi Salimi {Sh.zamani and jafari}@ustmb.ac.ir

Outline 1 Security Challenges 2 Security Principles 3 WSN Attacks 4 Conclusion 4 Security in WSN

Security Challenges The broadcast nature of the wireless communication. The network deployment in hostile environments (e.g. battlefield, forest) with relatively poor physical protection. The limitations in energy, computational power and memory. The extremely large number of interacting devices in a sensor network. The dynamic nature of WSN (frequent changes in both its topology and its membership) Security in WSN

Security Principles Data Confidentiality: Ensuring that only authorized sensor nodes can access the content of the messages. Data Authentication: Ensuring that the data is originated from the correct source. Data Integrity: Ensuring that any received data has not been altered in transmit by unauthorized parties. Data Freshness: Ensuring that no old messages have been replayed. Availability: Ensuring that services offered by whole WSN or by a single sensor node must be available whenever required. Security in WSN

Type of Attacks From the point of view of how to Attack: Passive: Only monitors the communication channel. Threatens the confidentiality of data. Active: Attempts to delete, add or alter the transmission on the channel. Threatens data integrity, authentication and confidentiality. From the point of view of Attacker’s Device: Mote-Class Attacker: Has access to a few nodes with similar capabilities to those deployed in the network. Laptop-Class Attacker: Has access to more powerful devices like a laptop. Has advantages over legitimate nodes like greater battery power, more capable cpu and high-power antenna. From the point of view of penetration to Network: Insider: Has compromised some authorized nodes of the network (stolen key material, run malicious code). Outsider: Has no special access to the network. Security in WSN

Attacks in WSN(1/6) Network Layer Attacks Physical Jamming, Tampering Link Collision, Exhaustion, Unfairness Network and Routing Spoofed, Selective forwarding, Sinkhole, Sybil, Wormholes, Hello flood Transport Flooding, Desynchronization Network Layer Attacks Physical Jamming, Tampering Link Collision, Exhaustion, Unfairness Network and Routing Spoofed, Selective forwarding, Sinkhole, Sybil, Wormholes, Hello flood Transport Flooding, Desynchronization Security in WSN

Attacks in WSN(2/6) Physical Layer Jamming: Interference with the radio frequencies a network's nodes are using. Security in WSN

Attacks in WSN(3/6) Data Link Layer Collision: Altering of transmission octets to disrupt the packets. (checksum mismatch) Security in WSN

Attacks in WSN(4/6) Network Layer Sinkhole: The adversary attracts the surrounding nodes with unfaithful routing information. Security in WSN

Attacks in WSN(5/6) Network Layer Wormhole: The adversary tunnels the traffic received in a part of the network to another. Security in WSN

Attacks in WSN(6/6) Network Layer Sybil attack: A single node presents multiple identities to other nodes. Identity Table: Current = X Identity Table: Current = X,A,C Identity Table: Current = X,A Identity Table: Current = X,A,C,B,D Identity Table: Current = X,A,C,B A F M B C D E N Security in WSN

Conclusion Need for physical network protection (not always possible). Cryptography can provide link layer encryption and authentication mechanisms (MAC) but this is not enough. End to end security mechanisms are impractical. Careful protocol design (routing, localization, data aggregation) with respect to security principles and attacker models. Consideration of energy issues when adapting countermeasures. Security in WSN

References(1/4) S. Ganeriwal, S. Capkun, C.-C. Han, and M. B. Srivastava. Secure time synchronization service for sensor networks. In WiSe ’05: Proceedings of the 4th ACM workshop on Wireless security, pages 97–106, New York, NY, USA, 2005. ACM Press. L. Lazos and R. Poovendran. Serloc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73–100, 2005. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: security protocols for sensor networks. Wireless Networking, 8(5):521–534, 2002. Y.Zhou,Y.Fang,Y.Zhang, "Security Wireless Sensor Networks: A Survey", IEEE Communication Surveys, Vol.10, No.3, 3rd Quarter 2008. J. M. McCune, “Detection of Denial-of-Message Attacks on Sensor Network Broadcasts,” Proc. 2005 IEEE Symp. Security and Privacy (SP’05), Oakland, CA, May 2005. J. R. Douceur, “The Sybil Attack,” Proc. 1st ACM Int’l. Wksp. Peer-to-Peer Systems (IPTPS’02), Mar. 2002. http://en.wikipedia.org/wiki/Zigbee, Last access 4/5/2010. W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,” IEEE Network, vol. 20, no. 3, 2006. Security in WSN

References(2/4) J. Deng, R. Han, and S. Mishra, “Defending against path-based DoS attacks in wireless sensor networks,” in SASN ’05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005. C. Kraub, M. Schneider, and C. Eckert, “Defending against falseendorsement-based DoS attacks in wireless sensor networks,” in WiSec: Proc. of the First ACM Conference on Wireless Network Security, 2008. C. Kraub, M. Schneider, and C. Eckert, “An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs”, in IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, 2008 K.Kredo and P.Mohapatra, "Medium Access Control in Wireless Sensor Network", Computer Networks, June 2006. Y. WANG, G. ATTEBURY,B. RAMAMURTHY, “ A SURVEY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORKS”, 2ND QUARTER 2006, VOLUME 8, NO. 2 T. Kavitha, D. Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security 5 (2010) 031-044, 2009 J. Walters, Z. Liang, W. Shi, V. Chaudhary ,“ Wireless Sensor Network Security: A Survey ”, Auerbach Publications, CRC Press, 2006 A. Becher, Z. Benenson, M. Dornseif, “Tampering with Motes: Real-World Attacks on Wireless Sensor Networks”, 2006 Security in WSN

References(3/4) A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” IEEE Computer, vol. 35, no. 10, pp. 54–62, 2002.  E. Shi and A. Perrig, “Designing secure sensor networks,” Wireless Communication Magazine, vol. 11, no. 6, pp. 38–43, December 2004. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113–127, May 2003. J. Newsome, E. Shi, D. Song, A.Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses”, Center for Computer and Communications Security, 2004 http://en.wikipedia.org/wiki/Key_distribution_in_wireless_sensor_networks, Last access 25/5/2010 R. Maheshwari, J. Gao, S. R. Das, "Detecting Wormhole Attacks in Wireless Networks using Connectivity Information" , To appear in IEEE INFOCOM 2007, Alaska L. Hu and D. Evans. Using directional antennas to prevent wormhole attacks. In Network and Distributed System Security Symposium (NDSS), 2004. Y. Hu, A. Perrig and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976, 1986, 2003. Security in WSN

References(4/4) I.Krontiris,Th.Giannetsos,T.Dimitriou, "Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side", Athens Information Technology, Peania, Athens,Greece. Ch.Tumrongwittayapak, R.Varakulsiripunth, "Detecting Sinkhole Attacks In Wireless Sensor Networks" ,ICROS-SICE International Conference, Aug 2009, Japan. Some Slides Taken from Presentation of Pyrgelis Apostolos, “Cryptography and Security in Wireless Sensor Networks”, Department of Computer Engineering and Informatics University of Patras, 2009, Greece. Security in WSN