Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Wireless Sensor Networks Haywood Ho
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
Wireless Tracking System Midcourse Design Review Team Members Ying W. Moy Mohammed A. Dastigir Hassan Malik Advisors Prof. Moritz Prof. Krishna Prof. Koren.
Wireless Sensor Networks. The most profound technologies are those that disappear. They weaves themselves into the fabric of everyday life until they.
Reconfigurable Sensor Networks Chris Elliott Honours in Digital Systems Charles Greif and Nandita Bhattacharjee.
Generic Sensor Platform for Networked Sensors Haywood Ho.
CS526 Wireless Sensor Networks Instructor: KD Kang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Key management in wireless sensor networks Kevin Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Wireless Sensor Networks
Wireless Sensor Networks and Privacy Osman Ceylan Istanbul Technical University.
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
Presented by : Poorya Ghafoorpoor Yazdi 2012_2013 Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Wireless Sensor Networks CS 4501 Professor Jack Stankovic Department of Computer Science Fall 2010.
MICA: A Wireless Platform for Deeply Embedded Networks
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
University of Virginia Wireless Sensor Networks August, 2006 University of Virginia Jack Stankovic.
Introduction to Wireless Sensor Networks
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Microcontroller-Based Wireless Sensor Networks
Presented BY:- S.KOTESWARA RAO 09511A0528. INTRODUCTION Bluetooth is wireless high speed data transfer technology over a short range ( meters).
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
By Christy Esther S 10MBE0005.  Tiny, wireless sensors (or) motes.  Kris Pister and Randy,1998 (UC BERKELEY)  Smart sand.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Overview of Sensor Networks David Culler Deborah Estrin Mani Srivastava.
Chris Karlof and David Wagner University of California at Berkeley
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Ad Hoc Network.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Wireless Sensor Networks
Discovering Sensor Networks: Applications in Structural Health Monitoring Background Lecture: Part 4 Wireless Sensor Networks.
University of Virginia Wireless Sensor Networks Sept. 12, 2007 University of Virginia Jack Stankovic.
1 Wireless Networks Lecture 34 Wireless Sensor Networks Part I Dr. Ghalib A. Shah.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Wireless sensor networks: a survey
Wireless Sensors Networks - Network Address Allocation Presented by: Assaf Goren Supervisor: Dr. Yehuda Ben-Shimol.
Wireless Sensor Networks
Wireless Sensor Networks
Overview of Wireless Networks:
Ioana Apetroaei Ionuţ-Alexandru Oprea Bogdan-Eugen Proca
Introduction to Wireless Sensor Networks
Adhoc and Wireless Sensor Networks
Mobile ad hoc networking: imperatives and challenges
Securing Wireless Sensor Networks
Wireless Sensor Networks (WSN’s) Security Lecture 13
Connected Sensor Cover Problem
Presentation transcript:

Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU

Ongoing Work  Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation  Ad Hoc Network Security Network access control Traceback of compromised nodes  Overlay (P2P) Network Security Detection and identification of attackers Secure routing  Malicious Code Prevent virus and worm self-propagation Detecting buffer overflow attacks

Distributed Sensor Networks  Berkeley Mica2 Mote (2002): 4 MHZ processor, 4 KB RAM 19.2K bit rate OS: TinyOS cost: about $150  Berkeley Spec (2003): size: 2 mm * 2.5 mm cost: <$1  Eventual goal: smart dust size: 1 mm 3 Types of sensors temperature humidity vehicular movement pressure acoustic light magnetic Mica2Mica2dotSpec  Self-organize into multi-hop wireless sensor networks

Sensor Network Applications  Military applications battlefield surveillance, battle damage assessment, biological and chemical attack detection  Environmental applications fire, flood, air pollution detection  Health applications patient monitoring, diagnostics, drug administration  Home applications home automation, smart environment  Other commercial applications transportation, vehicle tracking, interactive toys

Security Threats  Physical destruction of sensor nodes  Radio jamming (physical layer attack)  Higher layer attacks by both outsiders and insiders (compromised nodes) eavesdropping on communications injecting false data  deceiving the base station  resource consumption attacks dropping, altering, or replaying packets Attacks can target both the application and the underlying networking protocols

Security and Privacy Solution for Data-centric Sensor Networks

The Framework and The Security Building Blocks