Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Security Issues in Wireless Sensor Networks -Ninad Naik.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
Introduction to Wireless Sensor Networks
#1 The Conventional Wisdom About Sensor Network Security… David Wagner U.C. Berkeley.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
An Advanced Signature System for OLSR Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Design of Secure and Energy- Efficient Wireless Ad-Hoc Sensor Networks Mukesh Singhal Laboratory For Advanced Networking Department of Computer Science.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Security in Wireless Sensor Networks
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Chris Karlof and David Wagner University of California at Berkeley
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
General Classes of TCP/IP Problems
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Detecting Denial-of-Service Attacks against Sensor Networks
An Overview of Security Issues in Sensor Network
Presentation transcript:

Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols & Applications 11 May 2003 Report by Jim Gaskell CS 577, Prof Kinicki, Fall '11

Secure Routing in WSNs: Attacks & Countermeasures2 Overview Intro to WSNs Security Issues Attacks Countermeasures Summary & Conclusions

Secure Routing in WSNs: Attacks & Countermeasures3 Intro WSNs (Wireless Sensor Networks) Low power xmits & fixed energy Low computing power Trusting environment Future appears to lead to more sensors at less cost Base Station configuration

Secure Routing in WSNs: Attacks & Countermeasures4 Security Issues WSNs not conducive to security No popular protocol addresses issue Sensors may lack physical security Attackers can have vastly superior resources

Secure Routing in WSNs: Attacks & Countermeasures5 Security Issues (cont) Usages where security matters: Burglar alarms Building monitoring Emergency response Often lack of physical security MILITARY & POLICE DARPA in-part sponsored paper

Secure Routing in WSNs: Attacks & Countermeasures6 General Message Types Commands from the Base Station to the Nodes Data from the Nodes to the Base Station Communication between Nodes to establish routing

Secure Routing in WSNs: Attacks & Countermeasures7 Physical Security Maybe the best way to Attack a mesh: Many Nodes distributed over a fairly wide area Obtain one and take it apart Compromise it and, perhaps, return it to the field

Secure Routing in WSNs: Attacks & Countermeasures8 Protocols & their Attacks

Secure Routing in WSNs: Attacks & Countermeasures9 Attacks #1 - Aggregation issues #2 - Sink Holes #3 - Worm Holes #4 - Sybil #5 - ACK Spoofing #6 - HELLO Flooding

Secure Routing in WSNs: Attacks & Countermeasures10 #1 - Aggregation Issues "Aggregation" definition Selective forwarding Other Nodes can be discouraged from sending data

Secure Routing in WSNs: Attacks & Countermeasures11 #2 - Sink Holes Attacker looks attractive to other Nodes for relaying May be far away May be near to Nodes & far from BS If another node, it's a "selfish" node Selective Forwarding

Secure Routing in WSNs: Attacks & Countermeasures12 #3 - Worm Holes Messages from one area of the Network appear in a different area of the Network Even encrypted Messages can be relocated

Secure Routing in WSNs: Attacks & Countermeasures13 #4 - Sybil Have a single Node act as though it is many Perhaps inducing bogus Routing info

Secure Routing in WSNs: Attacks & Countermeasures14 #5 - ACK Spoofing Sends overheard ACKs to other Nodes (can be encrypted) Keeps routes alive and/or redirects path

Secure Routing in WSNs: Attacks & Countermeasures15 #6 - HELLO Flooding Attacker tells many Nodes that it's an excellent connection to the BS Nodes then (attempt to) send their data to the Attacker – perhaps indirectly via hops

Secure Routing in WSNs: Attacks & Countermeasures16 Countermeasures Public key protocol too costly for Nodes Symmetric key protocol OK for Node data, but not for Routing (no cit.) "Selfish" nodes can be dealt with by some protocols, but "Blackmailers" can still be used as an attack.

Secure Routing in WSNs: Attacks & Countermeasures17 Countermeasures (cont) SNEP (Sensor Network Encryption Protocol) has many security features µTESLA is a reduced functionality off-shoot of a Workstation authentication protocol

Secure Routing in WSNs: Attacks & Countermeasures18 Summary & Conclusions This paper is at least 8 years old It deals only in theory; not field tests It deals only with protocols available at the time By their very nature, current Nodes are not very robust against attacks

Secure Routing in WSNs: Attacks & Countermeasures19 Conclusions (cont) New protocols or hardware need only be compatible with other nodes in the mesh Applications can vary markedly in their requirements; choosing hdwr & software must be done with care beginning at the start of the Project

Secure Routing in WSNs: Attacks & Countermeasures20 Jim Gaskell Questions? or Comments!