Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Security Issues in Wireless Sensor Networks -Ninad Naik.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Trust relationships in sensor networks Ruben Torres October 2004.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Key Infection (smart trust for smart dust) Ross Anderson (Cambridge) Haowen Chan (CMU) Adrian Perrig (CMU)
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Network Topologies.
Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)
S ecurity I N W IRELESS S ENSOR N ETWORKS Prepared by: Ahmed ezz-eldin.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
The Sybil Attack in Sensor Networks: Analysis & Defenses
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Intrusion Tolerance for NEST
Presentation transcript:

Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004

Introduction to sensor networks Security Issues –Key establishment & setup –Secrecy & Authentication –Privacy –Robustness to DOS –Secure Routing –Resilience to node capture –Secure Group Management –Intrusion Detection –Secure Data Aggregation –Secure Sensor Network Research

Broad Range of Applications Wildlife Monitoring Machinery Performance Building Safety Military Applications Health Monitoring Countless other applications Most applications require some level of security!

Traditional security cannot be applied directly Sensor device limitations –Power, Processing, and Communication Nodes are often physically accessible, allowing possible physical attacks Sensor networks interact with their environments and with people

Security Research Issues These new problems present an opportunity to properly address network security Security is NOT a standalone component – it must be integrated into every component

Key Establishment & Setup Why not use existing protocols? –Public key cryptography has too much system overhead for sensor networks –Key establishment techniques must scale well to hundreds or thousands of nodes –Sensor nodes have different communication needs

Key Establishment - Potential Solutions Establish a network wide shared key –Problem: if one node is compromised, the whole network is compromised Instead use shared symmetric keys between each pair of nodes that are preconfigured –Problem: It doesn’t scale well! For an n node network, each node must store n-1 keys, and n * (n – 1) / 2 total keys are needed. Combine the above: use a network wide key to establish link keys, then erase the networkwide key. –Problem: New nodes cannot be added after initial deployment

Key Establishment - Potential Solutions (cont.) Bootstrapping Keys –each node shares a single key with the base station and the base station sets up keys between pairs. –Problem: requires a trusted base station that is the central point of failure Random Key Predistribution – –choose a large pool of symmetric keys, and give each node a random subset of the pool –not all nodes share a common key, but the network will still be fully connected if the probability of two nodes sharing a key is sufficiently high –Problem: once compromising a sufficient number of nodes, attackers could reconstruct the entire pool and break the scheme

Secrecy & Authentication – Cryptography End-to-end cryptography –Provides high level of security, but requires that keys be set up among all end points –Incompatible with passive participation and local broadcast Link-layer cryptography –Simplifies key setup –Supports passive participation and local broadcast –Problem? Intermediate nodes can eavesdrop and alter messages. Is this really a problem?

Cryptography Issues Performance Costs –Extra computation Could be reduced by additional hardware but this increases node cost and will it really fix the problem? –Increases packet size –Recent research shows that most of the performance overhead is attributable to increased packet size, not additional computation This limits how much dedicated cryptographic hardware will help

Robustness to Denial of Service Adversaries can simply broadcast a high- energy signal or violate the MAC protocol to disrupt communication Solutions? –Spread spectrum communication, but cryptographically secure spread spectrum radios are not commercially available –Automated defense, by simply routing around the jammed portion of the network

Secure Routing Current routing protocols suffer security vulnerabilities –DOS attacks, packet injection, replay attacks

Resilience to Node Capture Sensor networks are highly susceptible – the compromise of a single node usually compromises the entire network This is more of a problem because sensor networks often lack physical security

Solutions to Node Capture Physical solution –tamper resistant packaging Software: –Create algorithms that use majority voting schemes; send packets along multiple independent paths and check for consistency –Gather redundant data and analyze for consistency

Secure Group Management Groups of nodes perform data aggregation and analysis (tracking a moving object) The group may change continuously and quickly Protocols are needed for admitting new group members and supporting secure communication with the group Solutions conserve time and energy

Intrusion Detection Classic intrusion detection is very expensive in terms of memory, energy, and bandwidth To develop a solution, typical threat models must be analyzed Secure groups may be a possible solution for decentralized intrusion detection

Secure Data Aggregation Tons of data can be collected from the various nodes in the network How do we aggregate the data so as to reduce network traffic to the base station? Aggregation locations must be secured

Privacy How do we prevent sensor networks from being used to violate privacy? –Devices are becoming smaller, cheaper, and more effective at surveillance Solutions? –New laws, technological responses, and awareness

Other Issues What cryptographic algorithms are best suited for use in sensor networks? –Public key cryptography? Too expensive! –DES/Triple DES –AES –RC5 We need something that fits the processing and memory requirements of our nodes

Secure Sensor Network Research How can we build security into sensor networks from the outset? Advantages of sensor networks –Many applications will be deployed under a single administrative domain –It may be possible to exploit redundancy, scale, and physical characteristics