Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Chris Karlof and David Wagner
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Issues In Sensor Networks By Priya Palanivelu.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Wired Equivalent Privacy (WEP)
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Topics in Internet Research
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Applied Cryptography for Network Security
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Solutions for Wireless Sensor Networks 姓名 : 曹倫誠 學號 : Date:2010/06/07.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Secure Ad-Hoc Network Eunjin Jung
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Network Security David Lazăr.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Lecture 24 Wireless Network Security
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Chapter 7 – Confidentiality Using Symmetric Encryption.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Security Of Wireless Sensor Networks
An Overview of Security Issues in Sensor Network
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Lecture 36.
Lecture 36.
Presentation transcript:

Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran

Agenda The problem with Wireless Sensor Networks The network architecture The security issues A solution to the problem – SE-LEACH 2

The Problem with Wireless Sensor Networks is......that providing adequate security is difficult due to the unique requirements and restrictions. A Wireless Sensor Network (‘WSN’) is: A method of collecting data about an environment Comprised of multiple autonomous devices Sinks ( Collectors ) Motes ( Sensors ) An ad-hoc network where sensor data is sent from the motes back to the sink for analysis 3

Restrictions and Requirements Requirements Low Cost Reliable and low maintenance Decentralised structure Restrictions Low processing power Storage restrictions Finite energy supply 4

New Networking Environment Conceptually unique Traditional approaches not feasible New approaches for getting data from A to B Newly developed protocols: SPIN Sensor Protocols for Information via Negotiation Directed Diffusion LEACH Low-Energy Adaptive Clustering Hierarchy 5

LEACH 6

Security Issues New and interesting playground for attackers Multiple methods for attack: Denial of Service attacks Routing protocol attacks Sybil attack Privacy attacks Physical attacks 7

Adding Security New security techniques required to combat new attacks Traffic analysis prevention Authentication systems Tamper proof hardware 8

Proposed Solution Integration of security services needed Awareness of resource restrictions needed during design Simple protocols are preferable SE-LEACH (Security Enabled - Low-Energy Adaptive Clustering Hierarchy) An extension to the LEACH protocol An extendable, modular framework for security services Provides a method for providing adequate security to a WSN. 9

Where to put the security ? 10 Physical Data Network Session Presentation Application Transport Physical Link Application Security Network Physical Link Network Application OSI Model WSN Model Proposed Model

Security Services Data Confidentiality Encrypt what is sent Data Integrity Confirm what is received is unchanged Data Freshness Confirm that the message hasn’t been received before 11

Implementing the Security Services Data Freshness Add a single use token (Message + NONCE) Data Confidentiality Encrypt the message (Message + NONCE)Key1 Data Integrity Calculate a Hash or checksum of the message H((Message +NONCE) ⊕ Key1) Final Transmission (Message + NONCE)Key1 + H((Message +NONCE) ⊕ Key1) 12

Secret Keys Both Data Confidentiality and Data Integrity need secret keys. There are two possible options Asymmetric Keys Each pair of nodes creates their own key Computationally expensive Symmetric keys Statically configured keys Key Distribution Centres How do we do this without adding infrastructure ? 13

Key Distribution Centres 14

Key Distribution Schedule 15 Reproduced from: Bongartz, Ginzler, T., Bachran, T., & Tuset, P. (2008). SEAMAN: A Security-Enabled Anonymous MANET Protocol. NATO Research and Technology Organisation.

SE-LEACH The SE-LEACH framework provides: Distributed key management Protection of all user and network routing data through: Data Confidentiality Data Integrity Data Freshness A solid foundation on which to build 16

Questions? 17