Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.

Slides:



Advertisements
Similar presentations
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Introduction to Wireless Sensor Networks. 2 Learning Objectives Understand the basics of Wireless Sensor Networks (WSNs) –Applications –Constraints.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
Wireless Sensor Network Security Anuj Nagar CS 590.
Key management in wireless sensor networks Kevin Wang.
A Guide to major network components
Fault Tolerance in ZigBee Wireless Sensor Networks
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Microcontroller-Based Wireless Sensor Networks
Wireless Ad-Hoc Networks
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Introduction to Wireless Sensor Networks
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Wireless Sensor Network (WSN). WSN - Basic Concept WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively.
Ad Hoc Network.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
AD HOC NETWORKS BY: Bhagyashree Fulzele 03 Sneha Ghosh 23 Yamini Kothe 27 Namrata Nitnawre 12.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless sensor and actor networks: research challenges
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Introduction to Wireless Sensor Networks
Wireless Sensor Networks
Mobile Ad Hoc Networks Part 1: Overview
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Overview of Wireless Networks:
Ad-hoc Networks.
Introduction to Wireless Sensor Networks
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
Adhoc and Wireless Sensor Networks
Mobile ad hoc networking: imperatives and challenges
Wireless Sensor Networks
Presentation transcript:

Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture 11: Ad hoc Networks Security Dr. Kemal Akkaya

Kemal AkkayaWireless & Network Security 2 Ad Hoc Networks  In addition to Wireless LANs we will focus on Ad hoc Network Security  Two types of Ad Hoc networks:  Mobile Ad hoc Networks – MANETs  Wireless Sensor Networks – WSNs  We have mentioned these networks before  More Details and Comparison in this lecture

Kemal AkkayaWireless & Network Security 3  Formed by wireless hosts which may be mobile  No pre-existing infrastructure  Routes between nodes may potentially contain multiple hops  Nodes act as routers to forward packets for each other  Node mobility may cause the routes change A B C D A B C D What is MANET?

Kemal AkkayaWireless & Network Security 4  Advantages: low-cost, flexibility  Ease & Speed of deployment  Decreased dependence on infrastructure  Applications  Military environments soldiers, tanks, planes  Civilian environments vehicle networks conferences / stadiums outside activities  Emergency operations search-and-rescue / policing and fire fighting Applications of MANETs

Kemal AkkayaWireless & Network Security 5 Sensors A prototype Mote sensor developed at Univ. of California at Berkley (RF MHz 10kbps, 20 meter range) A wireless sensor node developed at Millennial Net Inc.  What is a sensor?  Small device that can sense information around itself  The sensing circuitry measures ambient conditions and transforms them into an electric signal  Collected reports are sent (broadcasted) via radio transmitter

Kemal AkkayaWireless & Network Security 6 Wireless Sensor Networks (WSNs) Sink node  Organizes and control sensors to perform a job assigned by command node  Interacts with command node via long range communication channel Command node  Performs mission planning  Arbitrate jobs among sensors  Fuses data Sensor node  Probes it surroundings  Short range communication  Programmable transmission range  Capable of operating in an active mode or a low-power stand-by mode

Kemal AkkayaWireless & Network Security 7 Sensor Network in a Lab

Kemal AkkayaWireless & Network Security 8 Characteristics of Wireless Sensor Networks (WSN)  Small and sheer number of nodes  Difficult to assign addresses to thousands of nodes  Data from multiple sources to a single sink  Tree-based routing architecture  Redundant data  Spatial: From the same region  Temporal : Similar times  Fixed Sensors  They do not move  Fixed or mobile sinks  Some applications may have moving sinks  Constant Data  Depending on the application: High volume or less  Constraints  Energy, bandwidth, memory etc.

Kemal AkkayaWireless & Network Security 9 Benefits and Applications of Wireless Sensor Networks  Environmental Monitoring  Great Duck Island  Volcano Eruptions  Structural Health Monitoring  Bridges, Buildings etc.  Military Applications  Target tracking  Border Control  Intrusion detection  Planetary Applications  NASA’s Mars mission  Biosensors and Healthcare Monitoring  Implantable sensors for human body  Chance to collect huge amount of and accurate data  Less cost in terms of hardware, software and labor when compared to wired solutions  Easy setup of the network  No need to deal with cables anymore  Various type of information gathering  Temperature, humidity, acoustics, motion, light, pressure, seismic, image, video, chemical, biological sensors are available

Kemal AkkayaWireless & Network Security 10 MANET vs WSN  Less energy, bandwidth, CPU constrained  All nodes mobile  Less number of nodes  Each node can communicate with any node  No redundant data  May have burst data  Severely constrained in terms of energy, bandwidth, memory, CPU and storage  Sensors are fixed  Huge number of nodes  All data flow to a sink  Significant Redundancy in Data  Constant Data most of the time

Kemal AkkayaWireless & Network Security 11 Security Challenges in Ad Hoc Networks  No inherent physical protection  physical connections between devices are replaced by logical associations  sending and receiving messages do not need physical access to the network infrastructure (cables, hubs, routers, etc.)  Broadcast communications  Wireless usually means radio, which has a broadcast nature  Transmissions can be overheard by anyone in range  Anyone can generate transmissions, which will be received by other devices in range which will interfere with other nearby transmissions  Thus it is easier to implement jamming, eavesdropping, injecting bogus messages, and replaying previously recorded messages

Kemal AkkayaWireless & Network Security 12 Security Challenges in Ad Hoc Networks  Limited resources (e.g., CPU cycles, battery supply)  Susceptible to Denial of Service attacks  Can not execute computation-heavy algorithms like public key algorithms  Simpler and energy-efficient mechanisms are needed  Dynamic Topologies and Membership  Nodes may leave and join  Any malicious or misbehaving node can create hostile attack or keep all other nodes from providing any service  Trust relations may change  No trustworthy third party  Key management is an issue  No online CA or Trusted Third Party is difficult to deploy security mechanisms such as public key encryption or digital signature

Kemal AkkayaWireless & Network Security 13 Security Wired network vs. Ad hoc network  Wired network  Attacker must gain physical access to wired link  Attacker has to sneak through firewalls or security gateways  Ad hoc network  Infrastructureless network does not have an effective defense  Wireless attacks may come from all directions  Every node can encounter with an attacker  Issues to be considered in this class for Ad hoc Networks  Key Management  Secure Routing  Trust  Intrusion Detection

Kemal AkkayaWireless & Network Security 14 Summary Any solution must satisfy the following requirements :  The cost of implementing the security mechanism must not be prohibitive.  The security mechanism must be simple to implement and maintain.  There should be minimum changes to existing standards and products.  The solution should be scalable.  The solution should be upgradeable.