DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Chris Karlof and David Wagner
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Wireless Sensor Network Security Anuj Nagar CS 590.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Security in Wireless Sensor Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
RM-MAC: A Routing-Enhanced Multi-Channel MAC Protocol in Duty-Cycle Sensor Networks Ye Liu, Hao Liu, Qing Yang, and Shaoen Wu In Proceedings of the IEEE.
Network Security Introduction
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Introduction Wireless devices offering IP connectivity
Mobile ad hoc networking: imperatives and challenges
Wireless Sensor Networks (WSN’s) Security Lecture 13
An Overview of Security Issues in Sensor Network
Sensor Networks Security
Presentation transcript:

DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang

Agenda  Introduction  Concepts  Denial of Service Threat  Physical layer  Link layer  Network layer  Transport layer  Conclusion

Introduction  Real-time data processing  Applications  Availability  Denial of service

Concepts  Application dependent networks  Limited individual capability of nodes  Must continue operating after significant node failure

Security demands of a network  Network has to face harsh environments and intelligent opposition  Disasters  Public safety  Home healthcare  Design time consideration

Denial of Service Threat  Any event that diminishes or eliminates a network’s capacity to perform it’s expected function  Reasons may be hardware failures, software bugs, resource exhaustion, environmental conditions or other complicated interactions.

Layered Network Architecture  Improves robustness of the system  Each layer is vulnerable to different DoS attacks  Some attacks may crosscut multiple layers

Layered model

Physical layer  Nodes use wireless communication  Base stations use wired or satellite communication  Attacks-  Jamming  Tampering

Jamming  Interferes with radio frequencies of nodes  Randomly distributed k nodes can put N nodes out of service (k<<N)  Effective in single frequency networks

Detection  Determined by constant energy that impedes communication  Constant jamming prevents nodes from exchanging data or even reporting attack to remote monitoring stations  Sporadic jamming is also effective

Prevention or mitigation  Spread-spectrum communication – not feasible solution  Attacked nodes can be put in long-term sleep and have them wake up periodically to test the channel  High priority messages to defend against intermittent jamming

Defense against jamming

Tampering  Attacker can physically tamper nodes  Attacker can damage and replace computation hardware  Sensitive material is exposed

Prevention or mitigation  Camouflaging or hiding nodes  Erase cryptographic or program memory

Link layer  Protocols requires cooperation between nodes to arbitrate channel use making them more vulnerable to DoS attack  Attacks-  Collision  Exhaustion  Unfairness

Collision – detection and prevention  Adversary may need to induce collision in one octet of transmission  Attacker requires less energy to listen for transmission  No complete solution is known  Errors are detected using checksum mismatch  Error correction codes can be used

Exhaustion  Repeated retransmissions are triggered by unusually late collision leading to exhaustion  Affect availability  A node could reportedly request channel access with RTS  Causes power losses

Detection and mitigation  Random back-offs  Time division multiplexing  MAC admission control rate limiting  Limiting the extraneous responses required

Unfairness  Degrades service rather than denying it  It exploits MAC-Layer priority schemes  It can be prevented using small frames  Adversary can cheat while vying for access

Network and Routing Layer  Messages may traverse many hops before reaching the destination  The cost of relaying a packet and the probability of its loss increases in an aggregate network  Every node can act as a router  Routing protocols should be simple and robust

Neglect and Greed  A neglectful node arbitrarily neglects to route some messages  Its undue priority to messages originating from it makes it greedy  Multiple routes or sending redundant messages can reduce its effect  It is difficult to detect

Homing  Important nodes and their identities are exposed to mount further attacks  A passive adversary observes traffic to learn the presence and location of critical resources  Shared cryptographic keys are an effective mechanism to conceal the identity of such nodes  This makes the assumption that none of the nodes have been subverted

Misdirection  Messages are forwarded in wrong paths  This attack targets the sender  Adversary can forge replies to route discovery requests and include the spoofed route  Sensor networks can use an approach similar to egress filtering

Black Holes  Nodes advertise zero cost routes to every other node  Network traffic is routed towards these nodes  This disrupts message delivery and causes intense resource contention  These are easily detected but more disruptive

Authorization  Only authorized node can share information  Public-key encryption can be used for routing updates  The problems are with computational and communication overheads and key management

Monitoring  Nodes can keep monitoring their neighbors  Nodes become watchdogs for transmitted packets  Each of them has a quality-rating mechanism

Probing  A network probe tests network connectivity  This mechanism can be used to easily detect Black holes  A distributed probing scheme can detect malicious nodes

Transport layer  Manages end-to-end connections  Sensor Networks utilize protocols with minimum overhead  Threats-  Flooding  Desynchronizations

Flooding  Adversary send many connection establishment request to victim  Each request causes allocation of resources  It can be prevented by limiting the number of connections  Connectionless protocols are not susceptible to this attack  Another solution is client puzzles

Desynchronization  The attacker forges messages to one or both ends with sequence numbers  This causes the end points to request retransmissions of missed frames  This may lead to lack of availability and resource exhaustion  Authentication can prevent such an attack

Adaptive rate control  Describe a series of improvements to standard MAC protocols  Key mechanisms include Random delay for transmissions Back-off that shifts an applications periodicity phase Minimization of overhead in contention control mechanisms Passive adaptation of originating and route-through admission control rates Anticipatory delay for avoiding multihop hidden node problems

RAP  Real-time location based protocol  Velocity monotonic scheduling  RAP can use clock synchronization

Conclusion  Attempts at adding security focus on cryptographic- authentication mechanisms  Use of higher security mechanisms poses serious complications in Sensor Networks  It is essential to incorporate security considerations during design-time  Without adequate protection against DoS and other attacks sensor networks may not be deployable at all

References  A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, 2002, pp. 54–62.  A.D. Wood and J.A. Stankovic, “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks”, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems,  David R. Raymond and Scott F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1, 2008, pp