Wireless Sensor Networks (WSN’s) Security Lecture 13

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Security in Mobile Ad Hoc Networks
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Wireless Sensor Networks
Fault Tolerance in ZigBee Wireless Sensor Networks
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
MICA: A Wireless Platform for Deeply Embedded Networks
Security in Wireless Sensor Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Wireless Sensor Networks. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u..
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Chris Karlof and David Wagner University of California at Berkeley
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Overview of Wireless Networks:
Classification of various Attacks.
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Wireless Sensor Network (WSN)
CSE 4905 Network Security Overview
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Security Issues in Wireless Sensor Networks
Adhoc and Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Protocols.
An Overview of Security Issues in Sensor Network
Cross-layer Analysis for detecting Wireless Misbehavior
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Protocols.
Presentation transcript:

Wireless Sensor Networks (WSN’s) Security Lecture 13

Mote A very low cost low power computer Monitors one or more sensors External Memory Digital I/O ports Radio Transceiver Analog I/O Ports Microcontroller A/D D/A Sensor A very low cost low power computer Monitors one or more sensors A Radio Link to the outside world Are the building blocks of Wireless Sensor Networks (WSN)

Wireless Sensor Network “A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations.” - Wikipedia

Wireless Sensor Networks Formed by hundreds or thousands of motes that communicate with each other and pass data along from one to another Research done in this area focus mostly on energy aware computing and distributed computing

WSN Applications Environmental/Habitat monitoring Acoustic detection Seismic Detection Military surveillance Inventory tracking Medical monitoring Smart spaces Process Monitoring

TinyOS What is TinyOS open-source operating system wireless embedded sensor networks component-based architecture Developed at UCB in collaboration with Intel Research Current Stable Version is 1.1.15 TinyOS 2.0 (T2) released on 6/11 Main Ideas – Low complexity Conserve power – sleep as frequently as possible Written in nesC – next generation C compiler

Different Targets mica mica2 mica2dot micaz telos telosb rene2 pc

Problems applying traditional network security techniques Sensor devices are limited in their energy, computation, and communication capabilities. • Sensor nodes are often deployed in open areas, thus allowing physical attack. • Sensor networks closely interact with their physical environments and with people, posing new security problems. • In-network processing requires intermediate nodes to access and modify information.

Security in sensor networks For many sensor network applications, security is critical. Public safety, special operations, healthcare, etc. Sensor network protocols should incorporate security mechanisms in the original design.

Security in sensor networks For many sensor network applications, security is critical. Public safety, special operations, healthcare, etc. Sensor network protocols should incorporate security mechanisms in the original design.

DoS in Sensor Networks [Wood et al.] What is DoS? Attack that reduces or eliminates the network’s ability to perform its function. E.g., hardware failures, software bugs, resource exhaustion, etc. What are the possible DoS attacks at various protocol layers? (Explained in the following slides)

Physical layer Attacks: Defenses: Jamming. Tampering. Jamming: Spread-spectrum techniques. Lower duty cycle with priority messages. Alternate modes of communication. Tampering: “Self-destruction” Hiding nodes.

Link layer Attacks: Defenses: Collision induction. Battery exhaustion. Unfairness. Defenses: Collision induction. . Fairness. Error correcting codes (?) .Small frames. Collision detection. Collision-free MAC. Rate limitation. Streamlined protocols.

Network layer: attacks Misdirection. An adversary misdirects packets by identity deception through replaying routing information. With such identity deception, the adversary is capable of launching harmful and hard-to-detect attacks to misdirect traffic Gray/black holes. In a black hole attack, the malicious node replies to every routing request saying that it has a route to the given destination. So, unsuspecting nodes start sending data to the destination through the black hole. This way a black hole diverts most of the traffic in the network to itself, and later dumps it. A gray hole attack is a variation of the black hole attack, where the malicious node is not initially malicious, it turns malicious sometime later.

Network layer: defenses Authorization. Only authorized nodes participate in routing. Need authentication mechanisms. Monitoring. Monitor node behavior. Probing. Redundancy.

Transport layer Attacks: Defenses: Flooding. Desynchronization. Message fabrication to get end points out of sync. Defenses: Flooding: Limit number of connections. Challenges/puzzles to clients. Desynchronization: Authenticate all messages (including header fields)

Security Focus in WSN’s Communication security in sensor networks. Data classification and related security threats. Location-based security mechanism.

Types of data Mobile code. Sensor node location. Application data. Goals: Minimize security-related energy consumption. Different protection levels.

Target sensor net architecture Localized algorithms. Local broadcast. Mobile code.

Security threats Insertion of malicious code. Interception of messages with node location information. Interception of application data. Injection of false data. Lower risk.

Security architecture Symmetric key encryption. All messages encrypted. Three security levels: Level I: mobile code. Level II: node location information. Level III: application data. Encryption strength: Level I > level II > level III. Encryption algorithm with adjustable strength (number of rounds).

Security architecture (cont’d) Group keys. Every user: set of keys, pseudorandom generator, and seed. Periodically and synchronously, nodes change keys.

Security levels Level I uses strongest encryption for mobile code injection. 32 rounds. Level II: Location-based keys. Different for different “cells”. Protect network from compromised keys. Level I: Weakest security. 22 rounds.

Performance Cost of encryption/decryption. Energy considerations. Rockwell WINS node.

Focus Routing security in sensor networks. Problem: Current routing protocols for sensor networks do not consider security. Vulnerable to attacks. Not easy to make these protocols secure.

Contributions Threat models and security goals for sensor network routing. Two new attacks: sinkhole and HELLO floods. Security analysis of routing and topology control algorithms. Attacks against these protocols. Countermeasures and design issues for secure routing in sensor networks.

Deployment and platform Heterogeneous deployment. Mica motes with TinyOS. Base stations. Aggregation points.

Sensor- and ad-hoc networks Traffic considerations: Ad hoc networks exhibit more general patterns. Sensor networks: Many-to-one. One-to-many. Local. Capabilities. Sensor nodes are typically more limited. Trust relationships. E.g., to perform aggregation, duplicate pruning, etc.

Attacks Spoofed, altered, replayed routing information. Selective forwarding. Black/gray hole. Sinkhole. Sybil. Single nodes presents multiple id’s to others. Wormhole. HELLO flood. (Link-layer) ACK spoofing.

Countermeasures Outsider attacks: Insider attacks: Link layer encryption and authentication. Shared keys. Insider attacks: Identity verification. Multipath routing. Bi-directional link verification. Limiting number of neighbors. Sinkhole and wormhole attacks are harder to circumvent. Design routing protocols where these attacks are ineffective. E.g., geographic routing. ???

References CMPE259-Sensor Networks - Katia Obraczka http://www.cs.wayne.edu/~weisong/papers/walters05-wsn-security-survey.pdf www.cs.berkeley.edu/.../SASN03.ppt CMPE259-Sensor Networks - Katia Obraczka Shali Jain et al., Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks, 2010 International Journal of Computer Applications (0975 – 8887), Volume 1(7). Guoxing Zhan et. Al. TARF:A Trust-Aware Routing Framework for Wireless Sensor Networks