Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Trust relationships in sensor networks Ruben Torres October 2004.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
Introduction to Wireless Sensor Networks
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
He Huang Introduction:The Flooding Time Synchronization Protocol.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Wireless Sensor Network Security Anuj Nagar CS 590.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Clock Synchronization in Sensor Networks for Civil Security Farnaz Moradi Asrin Javaheri.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts Jonathan M.McCune Elaine Shi Adrian Perrig and Michael K.Reiter.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Time synchronization for UWSN. Outline Time synchronization knowledge Typical time sync protocol Time sync in UWSN Discussion.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Simulation of DeReClus Yingyue Xu September 6, 2003.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Key Management Techniques in Wireless Sensor Networks
Introduction to Wireless Sensor Networks
Presentation transcript:

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel

Outline Introduction Time Syncronization Attacks Denial of Service (DoS) Attacks Conclusion

Need for Security in Sensor Networks Broadcast nature of Wireless Communication Lack of tamper-resistant hardware Limited storage & computational resources rendering public key cryptography impractical

Time Synchronization Attacks

Time Synchronization Protocols Time synchronization protocols : – provide a mechanism for synchronizing the local clocks of the nodes in a sensor network – used by many applications of sensor networks, such as tracking and localization. Attacks on time-synchronization protocols: – have one main goal, to somehow convince some nodes that their neighbors clocks are at a different time than they actually are.

Time-sync Protocol for Sensor Networks (TPSN) TPSN initially creates a spanning tree of the sensor network. While the tree is being built, the nodes perform pair-wise synchronization along the edges of the tree. Each node exchanges synchronization messages with its parent in the spanning tree.

Time-sync Protocol for Sensor Networks

Flooding Time Synchronization Protocol (FTSP) Root node broadcasts its local time and any nodes that receive that time synchronize their clocks to that time. Synchronization messages: 1. rootID 2. seqNum 3. sendingTime Whenever a node receives a message from the root node, it updates its global time. In addition, it broadcasts its own global time to its neighbors.

Flooding Time Synchronization Protocol Each node retains the highest sequence number it has received and the rootID of the last received message used. If a node does not hear a time synchronization message for a ROOT_TIMEOUT period, it declares itself to be the new root. If a root hears a time synchronization message from another root with lower ID than itself, it gives up its root status.

Attacks on Time Synchronization Protocol for Sensor Networks Send Incorrect Information to its children Lie about its level in the tree It can avoid participating in the tree building phase.

Attacks on FTSP The compromised node can claim to be the root node with ID 0 and begin at a higher sequence number than the original root All updates originating at the actual root node will be ignored.

Counter Measure For Time Synchronization Attacks Corrupted Root: – A subset of the nodes act as the root on a rotating basis. – All nodes share a private key with that subset of the nodes that may become a root. – Any corrupted nodes might continue to send erroneous updates under this scheme, but the effects on the nodes' calculations of the skew and offset would be reduced.

Counter Measure For Time Synchronization Attacks (contd…) Increasing Reliability : – The nodes record a subset S of the updates from their neighbors. Preventing False Updates: – Skeptic Node may cease sending updates to its neighbors – Policy of containment

Denial of Service Attacks

Denial of Service (DoS) Attacks Attempt to make a computer resource unavailable to intended users Force victims to reset/consume resources – Service no longer available Obstructs communication media between intended users and victim

DoS in WSNs Sleep Deprivation Attacks Path Based DoS Attacks Jamming Attacks

Sleep deprivation Attacks Also known as Battery Exhaustion Attacks Attacker drains the battery of pervasive computing device – Device rendered inoperable Successful Attack Currently not widespread but the potential exists

Forms of Sleep deprivation Attacks Service Request Power Attacks Benign Power Attacks Malignant Power Attacks

Remedy for Sleep Deprivation Attacks Existing security techniques Power Secure Architecture – Goal: Provide some guaranteed fraction of the systems expected battery life. – Fundamental Security Features: - 1. Multilayer Authentication 2. Energy Signature Monitoring

Power Secure Architecture Multilayer Authentication – Service Request Attacks – Energy profile of service Crippling energy level – Initial authentication must be lightweight process Energy Signature Monitor – Benign and Malignant Attacks – Energy Monitoring Unit (EMU) : Self-contained unit for dynamically measuring the systems power consumption – Concerns Allows Attacker to more easily tune a sleep deprivation attack Checking signature must be lightweight process

Power Secure Architecture (contd..) Energy Signature Monitor – Benign and Malignant Attacks – Energy Monitoring Unit (EMU) : Self-contained unit for dynamically measuring the systems power consumption – Concerns Allows Attacker to more easily tune a sleep deprivation attack Checking signature must be lightweight process

Path Based DoS Attacks Damaging form of DoS Attacks Hierarchical organization of sensor networks – Member Nodes – Aggregator Nodes – Base Station Easy to launch and disable large portions of WSNs PDoS Attack in End-to-End Communication in WSNs

Remedy for PDoS Attacks One-way Hash Chains (OHCs) Detect spurious packets using separate shared key Detect spurious packets using single path key Rate Control

Jamming Attacks Well-known attack on wireless communication Adversary can disrupt entire network with k randomly distributed jamming nodes, putting N nodes out of service, where k << N Attacks is simple and effective for single frequency networks

Remedy for Jamming Attacks Standard Defense: Various forms of spread-spectrum communication Phase I Phase II

Conclusion AttacksSeverityEase of implementation of solution PDoSHighMedium Sleep DeprivationMedium TPSNMedium JammingMediumHigh (Hardware cost involved) FTSPLowMedium

THANK YOU