Detecting Denial-of-Service Attacks against Sensor Networks

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Chris Karlof and David Wagner
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Detecting Malicious Routers Alper T. Mızrak, Keith Marzullo, Stefan Savage University of California, San Diego.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC Advanced Computer Networks Oleg Aulov CMSC.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Achieving Long-Term Surveillance in VigilNet Pascal A. Vicaire Department of Computer Science University of Virginia Charlottesville, USA.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST PI Meeting January 29, 2003.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
Ad Hoc Network.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Security in Wireless Networks Mike Swift CSE b Summer 2003.
TOPICS INTRODUCTION CLASSIFICATION CHARACTERISTICS APPLICATION RELATED WORK PROBLEM STATEMENT OBJECTIVES PHASES.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)
MAC Protocols for Sensor Networks
IMPROVING OF WIRELESS MESH NETWORKS.
Overview of Wireless Networks:
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
On the Lifetime of Wireless Sensor Networks
Intrusion Tolerance for NEST
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
MinJi Kim, Muriel Médard, João Barros
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
William Stallings Data and Computer Communications
DARPA Proposer’s Day for
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
<month year> September 2012
ITIS 6010/8010 Wireless Network Security
Congestion Control (from Chapter 05)
Network Architecture for Cyberspace
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
An Overview of Security Issues in Sensor Network
Congestion Control (from Chapter 05)
Presentation transcript:

Detecting Denial-of-Service Attacks against Sensor Networks Steven Cheung, Bruno Dutertre, Ulf Lindqvist RAID’05 September 8, 2005 This research is sponsored by DARPA under contract number F30602-02-C-0212 and NSF under grant number CNS-0434997. The views herein do not necessarily reflect the views of the sponsoring agencies.

Wireless sensor networks Protection for critical infrastructure Structural integrity monitoring Wildlife monitoring Intruder detection and tracking Precision agriculture

Characteristics of wireless sensor networks Resource constraints Limited energy reserve, computation power, memory Physical exposure Possibly deployed in remote locations, and spread across a large geographic region Collaborative processing Use sensor nodes for routing Unpredictable communication links

Physical attacks Examples: Detection approaches: Destroying sensor nodes using physical or electrical means Relocating sensor nodes Turning off sensor nodes Detection approaches: Nodes periodically send “I’m alive” packets to the base station Cooperative monitoring: Neighbor nodes exchange heartbeat messages with each other

Disruptive routers Compromised sensor nodes may drop or corrupt packets Related work: Secure implicit sampling [McCune et al ‘05] Secure trace-route [Padmanabhan-Simon ‘02] Hop-by-hop checking [Marti et al ‘00] Conservation of flow [Cheung-Levitt ‘97, Bradley et al ‘98] Need a scheme that is lightweight and can handle “malicious” routers

Hint-based approach Route for hint Normal route Base station When a node A forwards a packet p to its next-hop neighbor B, with probability  it will also send a hint h to the base station The hint is routed via the path that avoids B