Presentation is loading. Please wait.

Presentation is loading. Please wait.

Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.

Similar presentations


Presentation on theme: "Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture."— Presentation transcript:

1 Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture 11: Ad hoc Networks Security Dr. Kemal Akkaya E-mail: kemal@cs.siu.edu

2 Kemal AkkayaWireless & Network Security 2 Ad Hoc Networks  In addition to Wireless LANs we will focus on Ad hoc Network Security  Two types of Ad Hoc networks:  Mobile Ad hoc Networks – MANETs  Wireless Sensor Networks – WSNs  We have mentioned these networks before  More Details and Comparison in this lecture

3 Kemal AkkayaWireless & Network Security 3  Formed by wireless hosts which may be mobile  No pre-existing infrastructure  Routes between nodes may potentially contain multiple hops  Nodes act as routers to forward packets for each other  Node mobility may cause the routes change A B C D A B C D What is MANET?

4 Kemal AkkayaWireless & Network Security 4  Advantages: low-cost, flexibility  Ease & Speed of deployment  Decreased dependence on infrastructure  Applications  Military environments soldiers, tanks, planes  Civilian environments vehicle networks conferences / stadiums outside activities  Emergency operations search-and-rescue / policing and fire fighting Applications of MANETs

5 Kemal AkkayaWireless & Network Security 5 Sensors A prototype Mote sensor developed at Univ. of California at Berkley (RF 916.5 MHz 10kbps, 20 meter range) A wireless sensor node developed at Millennial Net Inc.  What is a sensor?  Small device that can sense information around itself  The sensing circuitry measures ambient conditions and transforms them into an electric signal  Collected reports are sent (broadcasted) via radio transmitter

6 Kemal AkkayaWireless & Network Security 6 Wireless Sensor Networks (WSNs) Sink node  Organizes and control sensors to perform a job assigned by command node  Interacts with command node via long range communication channel Command node  Performs mission planning  Arbitrate jobs among sensors  Fuses data Sensor node  Probes it surroundings  Short range communication  Programmable transmission range  Capable of operating in an active mode or a low-power stand-by mode

7 Kemal AkkayaWireless & Network Security 7 Sensor Network in a Lab

8 Kemal AkkayaWireless & Network Security 8 Characteristics of Wireless Sensor Networks (WSN)  Small and sheer number of nodes  Difficult to assign addresses to thousands of nodes  Data from multiple sources to a single sink  Tree-based routing architecture  Redundant data  Spatial: From the same region  Temporal : Similar times  Fixed Sensors  They do not move  Fixed or mobile sinks  Some applications may have moving sinks  Constant Data  Depending on the application: High volume or less  Constraints  Energy, bandwidth, memory etc.

9 Kemal AkkayaWireless & Network Security 9 Benefits and Applications of Wireless Sensor Networks  Environmental Monitoring  Great Duck Island  Volcano Eruptions  Structural Health Monitoring  Bridges, Buildings etc.  Military Applications  Target tracking  Border Control  Intrusion detection  Planetary Applications  NASA’s Mars mission  Biosensors and Healthcare Monitoring  Implantable sensors for human body  Chance to collect huge amount of and accurate data  Less cost in terms of hardware, software and labor when compared to wired solutions  Easy setup of the network  No need to deal with cables anymore  Various type of information gathering  Temperature, humidity, acoustics, motion, light, pressure, seismic, image, video, chemical, biological sensors are available

10 Kemal AkkayaWireless & Network Security 10 MANET vs WSN  Less energy, bandwidth, CPU constrained  All nodes mobile  Less number of nodes  Each node can communicate with any node  No redundant data  May have burst data  Severely constrained in terms of energy, bandwidth, memory, CPU and storage  Sensors are fixed  Huge number of nodes  All data flow to a sink  Significant Redundancy in Data  Constant Data most of the time

11 Kemal AkkayaWireless & Network Security 11 Security Challenges in Ad Hoc Networks  No inherent physical protection  physical connections between devices are replaced by logical associations  sending and receiving messages do not need physical access to the network infrastructure (cables, hubs, routers, etc.)  Broadcast communications  Wireless usually means radio, which has a broadcast nature  Transmissions can be overheard by anyone in range  Anyone can generate transmissions, which will be received by other devices in range which will interfere with other nearby transmissions  Thus it is easier to implement jamming, eavesdropping, injecting bogus messages, and replaying previously recorded messages

12 Kemal AkkayaWireless & Network Security 12 Security Challenges in Ad Hoc Networks  Limited resources (e.g., CPU cycles, battery supply)  Susceptible to Denial of Service attacks  Can not execute computation-heavy algorithms like public key algorithms  Simpler and energy-efficient mechanisms are needed  Dynamic Topologies and Membership  Nodes may leave and join  Any malicious or misbehaving node can create hostile attack or keep all other nodes from providing any service  Trust relations may change  No trustworthy third party  Key management is an issue  No online CA or Trusted Third Party is difficult to deploy security mechanisms such as public key encryption or digital signature

13 Kemal AkkayaWireless & Network Security 13 Security Wired network vs. Ad hoc network  Wired network  Attacker must gain physical access to wired link  Attacker has to sneak through firewalls or security gateways  Ad hoc network  Infrastructureless network does not have an effective defense  Wireless attacks may come from all directions  Every node can encounter with an attacker  Issues to be considered in this class for Ad hoc Networks  Key Management  Secure Routing  Trust  Intrusion Detection

14 Kemal AkkayaWireless & Network Security 14 Summary Any solution must satisfy the following requirements :  The cost of implementing the security mechanism must not be prohibitive.  The security mechanism must be simple to implement and maintain.  There should be minimum changes to existing standards and products.  The solution should be scalable.  The solution should be upgradeable.


Download ppt "Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture."

Similar presentations


Ads by Google