Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Authors: Chris Karlof and David Wagner
Security in Wireless Sensor Networks: Key Management Approaches
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
EKC Journal Paper Scouting A Presentation for the ResiliNets Group © 2008 Egemen Cetinkaya July 2008 Egemen Çetinkaya Department of Electrical Engineering.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Routing Security in Ad Hoc Networks
Chris Karlof David Wagner University of Califonia at Berkeley
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Wireless Sensor Network Security Anuj Nagar CS 590.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security in Wireless Sensor Networks
SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORK Presented by Chetan Rana U08CO213.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof, David Wagner University of California at Berkeley
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Wireless Sensor Networks. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u..
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Chris Karlof and David Wagner University of California at Berkeley
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Slide 1/29 DCSL: Dependable Computing Systems Lab L ITE W ORP : A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks Issa.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Wireless Sensor Networks (WSN’s) Security Lecture 13
Aggregation.
Chris Karlof and David Wagner Presenters: Hyowon Lee & Yongbae Bang
An Overview of Security Issues in Sensor Network
Presentation transcript:

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)

Key Contributions Secure routing issues in WSNs Secure routing issues in WSNs –Show how they are different from ad hoc networks –Introduce two new classes of attacks »Sinkhole attack »Hello flood attack Analyze security aspects of major routing protocols Analyze security aspects of major routing protocols Discuss countermeasures & design considerations for secure routing in WSNs Discuss countermeasures & design considerations for secure routing in WSNs

WSNs vs. Ad Hoc Networks Multi-hop wireless communications Multi-hop wireless communications Ad hoc nets: communication between two arbitrary nodes Ad hoc nets: communication between two arbitrary nodes WSNs WSNs –Specialized communication patterns »Many-to-one »One-to-many »Local communication –More resource constrained –More trust needed for in-network processing, aggregation, duplicate elimination

Assumptions Insecure radio links Insecure radio links Malicious nodes can collude to attack the WSN Malicious nodes can collude to attack the WSN Sensor are not tamper-resistant Sensor are not tamper-resistant Adversary can access all key material, data & code Adversary can access all key material, data & code Base station is trustworthy Base station is trustworthy Aggregation points may not be trustworthy Aggregation points may not be trustworthy

Threat Models Device capability Device capability –Mote class attacker –Laptop class attacker: more energy, more powerful CPU, sensitive antenna, more radio power Attacker type Attacker type –Outside attacker: External to the network –Inside attacker: Authorized node in the WSN is compromised or malicious

Security Goals Secure routing Secure routing –Support integrity, authenticity, availability of messages in presence of attack –Data confidentiality

Potential Attacks Attacks on general WSN routing Attacks on general WSN routing Attacks on specific WSN protocols Attacks on specific WSN protocols

Attacks on General WSN Routing Protocols Spoof, alter, or replay routing info. Spoof, alter, or replay routing info. –Create loops, attack or repel network traffic, partition the network, extend or shorten the source routes and generate false error messages. Selective forwarding Selective forwarding –Malicious node selectively drops incoming packets –Adversary can also modify packets and forward these messages

Sinkhole attacks Sinkhole attacks –Specific to WSNs –All packets are directed to base station –A malicious node advertises a high quality link to the base station to attract a lot of packets –Enable other attacks, e.g., selective forwarding or wormhole attack

Sybil attack Sybil attack –A single node presents multiple ID’s to other nodes –Affect distributed storage, multi-path routing, topology maintenance and geographic routing Wormhole Attack Wormhole Attack –Two colluding nodes –A node at one end of the wormhole advertises high quality link to the base station –Another node at the other end receives the attracted packets

Hello flood attack Hello flood attack –Specific to WSNs –In some protocols, nodes have to periodically broadcast “hello” to advertise themselves »Not authenticated! –Laptop-class attacker can convince it’s a neighbor of distant nodes by sending high power hello messages Acknowledgement spoofing Acknowledgement spoofing –Adversary spoofs ACKs to convince the sender a weak/dead link supports good link quality

Attacks on Specific Sensor Network Protocols TinyOS beaconing TinyOS beaconing –Construct a BFS Tree rooted at the base station –Beacons are not authenticated! –Adversary can take over the whole WSN by broadcasting beacons

Directed diffusion Directed diffusion Base station floods interest for named data and setting up gradients designed to draw events. Base station floods interest for named data and setting up gradients designed to draw events. –Suppression –Cloning (Replay interest) –Path influence –Selective forwarding & data tampering Geographic routing Geographic routing –Adversary false, possibly multiple, location info. –Create routing loop –GEAR considers energy in addition to location

Countermeasures Outsider attacks and link layer security Outsider attacks and link layer security –Prevent outsider attacks, e.g., Sybil attacks, selective forwarding, ACK spoofing –Cannot handle insider attacks »Wormhole, Hello flood, TinyOS beaconing Sybil attack Sybil attack –Every node shares a unique secret key with the base station –Create pairwise shared key for msg authentication –Limit the number of neighbors for a node Hello flood attack Hello flood attack –Verify link bidirectionality

Wormhole, sinkhole attack Wormhole, sinkhole attack –Cryptography may not help directly –Good routing protocol design –Geographic routing Geographic routing Geographic routing –Location verification –Use fixed topology, e.g., grid structure Selective forwarding Selective forwarding –Multi-path routing –Route messages over disjoint or Braided paths –Dynamically pick next hop from a set of candidates

Authenticated broadcast and flooding Authenticated broadcast and flooding –uTESLA is a protocol which uses asymmetric key cryptography and minimal packet overhead

Conclusions This paper covers security issues at network layer This paper covers security issues at network layer WSN security is challenging, new area of research WSN security is challenging, new area of research

Source : g/cs580s/karlof-wagner.ppt