Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Authors: Chris Karlof and David Wagner
Security in Wireless Sensor Networks: Key Management Approaches
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
EKC Journal Paper Scouting A Presentation for the ResiliNets Group © 2008 Egemen Cetinkaya July 2008 Egemen Çetinkaya Department of Electrical Engineering.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Routing Security in Ad Hoc Networks
Chris Karlof David Wagner University of Califonia at Berkeley
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Key management in wireless sensor networks Kevin Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security in Wireless Sensor Networks
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Wireless Sensor Networks. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u..
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Chris Karlof and David Wagner University of California at Berkeley
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Wireless Sensor Networks (WSN’s) Security Lecture 13
Chris Karlof and David Wagner Presenters: Hyowon Lee & Yongbae Bang
An Overview of Security Issues in Sensor Network
Presentation transcript:

Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First IEEE International Workshop on Sensor Network Protocols and Applications, May 11, 2003

Contribution Propose threat models and security goals for secure routing in wireless sensor networks Introduce seven attack techniques, including two novel attacks, sinkhole and HELLO floods. Present the detailed security analysis of all major routing protocols. Discuss countermeasures and design considerations for security routing protocols

Background What is sensor network? Outside Network Base station Sensor node Event Aggregation node

Background The properties of sensor network –Sensor Node: Lower-power, Lower-bandwidth, shorter-range Multihop wireless network –Aggregation node: Eliminate the redundancy, saving energy –Base station (Sink) More powerful than sensor nodes

Background Security limitation: UC berkeley lab: Mica mote –Limit Power Power: Two AA batteries Only two weeks at full power –Limit memory and computational power 4MHz 8-bit CPU, 4KB RAM, 512KB flash memory

Attacks on sensor network routing

Spoofed, altered, or replayed routing information Behavior: –Create routing loops, attract or repel network traffic, extend or shorten source routes Goal: –Generate false error messages, partition the network, increase end-to-end latency

Example

Selective forwarding Behavior: –Malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any further. Goal: –Attempt to include herself on the actual path of the data flow

Example Outside Network Base station Sensor node Event Aggregation node Malicious node Drop

Acknoledgement spoofing Behavior –Spoof link layer acknowledgments for “overheard” packet addressed to neighboring nodes Goal –Convincing the sender that a weak link is strong or that a dead or disabled node is alive –Enable selecting forward attack

Example Outside Network Base station Sensor node Event Aggregation node Malicious node Lost bad node

Sinkhole attacks Behavior –Making a compromised node look especially attractive to surrounding nodes Goal –Lure nearly all the traffic from a particular area through a compromised node, create a metaphorical sinkhole with the adversary at the center –Enable selecting forward attack

Example Sinkhole attack

Wormholes Behavior –Tunnel messages received in one part of network over a low-latency link and replays them in a different part Goal: –May be able to completely disrupt routing if an adversary situated close to a base station –Enable sinkhole attack –Exploit routing race condition

Example

Sybil attack Behavior –A single node presents multiple identities to other nodes in the network Goal: –Significantly reduce the effectiveness of fault- tolerant schemes

Example

HELLO flood attack Behavior –A laptop-class attacker broadcasting routing or other information with large enough transmission power could convince every node in the network that the adversary is its neighbor Goal –Enable wormhole attack by broadcasting wormholes

Example

Summary of attack

Countermeasures

Outsider attacks and link layer security Solution: –Global share key: link layer encryption and authentication Limitation: ineffective –Wormhole and HELLO flood attack –Insider attack or compromised node

Sybil attack Solution –Every node share a unique symmetric key with base station –Two node establish a shared key and verify each other’s identity –Base station limit the number of neighbors around a node –When a node is compromised, it is restricted to communicating only with its verified neighbors Limitation –Adversary can still use a wormhole to create an artificial link between two nodes to convince them

HELLO flood attacks Solution: –Verify the bidirectionality of a link before taking meaningful action –Every node authenticate each of its neighbors with an identity verification protocol using a trusted base station

Wormhole and sinkhole attacks Solution –Design routing protocols which avoid routing race conditions and make these attacks less meaningful Geographic routing protocols: construct a topology on demand using only localized interactions and information

Selective forwarding Solution: –Multipath routing: message routed over n paths whose nodes are completely disjoint –Nodes dynamically choose a packet’s next hop probabilistically from a set of possible candidates Limitation: –Completely disjoint paths is difficult to create

Countermeasure summary AttacksCountermeasure Outersiders, Sybil, HELLO floods, ACKs spoofing Link-layer encryption and authentication, multipath routing, identity verification, bidirectional link verification, authenticated broadcast Sinkhole attack wormhole attack Geographic routing protocols

Strength Demonstrate current routing protocols for wireless sensor networks are insecure Provide several countermeasures to against attacks: link layer encryption and authentication and so on

Questions?