Security Solutions for Wireless Sensor Networks 姓名 : 曹倫誠 學號 :79864015 Date:2010/06/07.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Chris Karlof and David Wagner
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
1 Balancing Push and Pull for Efficient Information Discovery in Large-Scale Sensor Networks Xin Liu, Qingfeng Huang, Ying Zhang CS 6204 Adv Top. in Systems-Mob.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
On the Node Clone Detection inWireless Sensor Networks.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Wireless Sensor Networks
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Security of the Internet of Things: perspectives and challenges
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Net 435: Wireless sensor network (WSN)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Aggregation.
Presentation transcript:

Security Solutions for Wireless Sensor Networks 姓名 : 曹倫誠 學號 : Date:2010/06/07

Outline Abstract Introduction Background on Sensor Networks Key Research Areas The UbiSec&Sens Project Conclusion

Abstract Security solutions for collecting and processing data in Wireless Sensor Networks, adequate security capabilities for medium and large scale WSNs The paper includes an overview on security and reliability challenges for WSNs. and introduces a toolbox concept to support such a framework.

Introduction Several such wireless sensors in a region self-organize and form a WSN, assisted driving or even in providing security at home or in public places. A key requirement from both the technological and commercial point of view is to provide adequate security capabilities. Fulfilling privacy and security requirements in an appropriate architecture for WSNs offering pervasive services is essential for user acceptance.

Five key features need to be considered when developing WSN solutions: Scalability Security Reliability Self-healing Robustness

Background on Sensor Networks Technology WSNs form a particular class of ad hoc networks that operate with little or no infrastructure They typically consist of a collection of application specific se- nsors, a wireless transceiver,an energy unit that may be a ba- ttery or a mechanism to obtain energy from the environment. Sensor nodes are distributed over a potentially vast geographical area to form a static, multi-hop, self-organizing network.

Threat Models and Their Relevance in WSNs The Dolev-Yao threat model often used to formally analyze crypto-protocols in communication net-works has its limitat- ions in the context of WSNs and for ubiq-uitous computing. A WSN adapted threat model should reflect that the channel is assumed to be insecure and the end-points cannot in gen- eral be trusted

Probabilistic Security Using “tamper-resistant units”: Each sensor node is equipped with a tamper-resistant component for the storage of sensitive e.g. key data, thus limiting the damage following the capture of nodes. Aiming at “probabilistic security”: In this setting, we do not assume that sensor nodes are tamper-resistant but rather limit what an at- tacker gains after reading data from captured sensor nodes.

Design Space of Security Solutions Extremely low-cost mechanisms that do not require processor intensive operations are needed. The data transmitted can be reduced by using data aggregation i.e. combining data (values) at the nodes.

Key Research Areas Solutions for the first take Into account the extended Dolev -Yao model,aiming at probabilis- tic security.

The top-night related research topics from the above research

Flexible routing and aggregator election: The configured WSN must be flexible enough to cope with gradually or abruptly disappearing nodes. the aggregation function performed at the aggregator node is “average. Re-election of aggregator nodes can help balance the energy- consumption in the WSN.

Concealed data aggregation: It is a concern within WSNs to both reduce the energy consumption at the sensor nodes and the effect of physical attacks on the nodes. Data aggregation based on deviation query and multiple monitoring sensors: For a condensed representation and transmission of the monitored data, it is useful to transmit more than one type of values

Secure distributed data storage: In some applications, monitored data must be stored in a distributed way. Since the WSN environment is volatile with nodes that disappear over time. Enhanced key pre-distribution: It is not possible for the manufacturer to configure all the sensitive information, how data is expected to flow in the network, is another parameter to consider when distributing keys

Data plausibility: Since a plausibility check always requires some redundant information, we need a trade-off between accuracy and efficiency. Provably secure routing: Routing has two main functions: finding routes to the sink nodes, and forwarding data packets via these routes

Resilient data aggregation: This item addresses how to make data aggregation at nodes robust and resilient in the presence of an adversary that can modify the input data. WSN access control: it is essential to provide an access control for end-users of WSN applications that ensures access to the monitored data for authorized parties only, support user-friendly data queries

The UbiSec&Sens Project The project is working towards a toolbox of security-aware components, depicted in Fig. 3, in this section,describes the solutions we have developed so far in the context of the EU collaborative project UbiSec&Sens.

Authentication and Re-Recognition With the Zero Common Knowledge (ZCK) protocol2) we provide an authen- tication protocol that establishes well-defined pair-wise security associations We show that with two keyed hash-chains per communication pair, one can establish a certain level of trust within the system ZCK ensures the re-recognition of a communication partner.

Concealed Data Aggregation The Concealed Data Aggregation (CDA)3) approach proposes to use symmetric additively homomorphic encryption transformations for end -to-end encryption of sensed data for reverse multicast traffic we show how the order preserving encryption scheme is used to com- pare encrypted data to extend the set of aggregation functions We have implemented this scheme on sensor nodes.

Key Pre-Distribution TAGK(Topology Aware Group Keying) establishes mutually disjoint regions with randomly chosen group keys per epoch and region for reverse multicast traffic. It provides probabilistic security and is essential to be able to use CDA. We have simulated very large WSNs, which confirm the feasibility and scalability of the approach. We have also implemented this scheme.

CONCLUSION we analyze three complementary WSN applications with the goal of developing a modular toolbox to support an integrated security and reliability architecture for medium and large-scale WSNs

Tkanks for your attention