1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Security Issues in Wireless Sensor Networks -Ninad Naik.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Chapter 1 Read (again) chapter 1.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
OSI Physical Layer.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Security in Wireless Sensor Networks
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
ANTHONY D.WOOD, A STANKOVIC & SANG H.SON UNIVERSITY OF VIRGINIA BY, SRIKANTH POKALA JAM: A Jammed-Area Mapping Service For Sensor Networks.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 4: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Low-Power Wireless Sensor Networks
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
DOS Attacks in Wireless Sensor Networks By Eric Bartocci & Justin Matthews.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless sensor and actor networks: research challenges
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Affordable Wireless Mobile Broadband Communication & Services Challenges & Key research areas Jens Zander Scientific Director Center for Wireless Systems.
A Prototype for the Continuous and Cost-Effective Measurement of River Discharge.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Wireless Sensor Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Physical Layer Network Fundamentals – Chapter 8.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Session 1: Technology Development August 15 NSF Workshop.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
The University of Adelaide, School of Computer Science
Wireless Communication Project
How SCADA Systems Work?.
Introduction to Wireless Sensor Networks
D A C B Radio Irregularity.
Kazuto Suzuki Hokkaido University
Denial-of-Service Jammer Detector Training Course Worldsensing
An Overview of Security Issues in Sensor Network
Presentation transcript:

1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala

2 The paper Introduction Theory and Application Denial of Service Threat Physical Layer Link Layer Networking Layer Transport Layer Conclusion References

3 Introduction WSN involves large-scale, real time data processing in complex environments WSN is used for various applications Availability is of great importance Consideration of security at design time is essential

4 Theory Growing use of application dependent sensor networks Many limitations exist in WSN like power reserves, wireless communication, identifiers Network must operate under partial failure Network must meet real time requirements Data may be intrinsically valid for short time

5 Application Sensor Networks are used in different environments with different needs Military application is primary Can be used in inaccessible locations like volcanoes Can be used in critical situations like natural or man made disasters In all applications network must be resilient to individual node failure

6 Denial of Service Threat Any event that diminishes or eliminates a network’s capacity to perform it’s expected function Caused by hardware failures, software bugs, resource exhaustion, environmental conditions or other complicated interactions

7 The Layered Approach A layered network architecture improves robustness Each layer has different attacks and different defensive mechanisms Some attacks are applicable across multiple layers

8 Tabular Representation

9 Physical Layer This layer deals with the physical transmission in the form of signals Nodes use wireless communication Base Stations use wired or satellite communication. Attacks Jamming Tampering

10 Jamming Interferes with radio frequencies An adversary can use k randomly distributed jamming nodes These k nodes can put N nodes out of service (k<<N) Effective for single frequency network

11 Detection of Jamming Determined by constant energy as opposed to lack of response Jamming can be sporadic and hence more difficult to detect yet effective Jamming itself prevents exchanging data or even reporting the attack

12 Prevention and Mitigation Spread spectrum communication (code spreading) It is less feasible due to design complexity, more power and more cost Attacked nodes can switch to lower duty cycle and wake up to check for jamming For intermittent jamming nodes send few high power, high priority messages to report attack

13 Local Jamming

14 Tampering Attacker can physically tamper nodes Likewise nodes can be interrogated and compromised Attacker can damage or replace sensor and computation hardware Attacker can extract sensitive material and use it for further attacks

15 Prevention and Mitigation Tamper proofing against physical damage Camouflaging or hiding nodes React to tampering by erasing cryptographic or program memory

16 Link Layer Provides Channel arbitration Cooperative schemes are vulnerable to DoS attacks Sensor Network is susceptible to Collision Exhaustion Unfairness

17 Collision Adversary may cause disruption by inducing collision in just one octet of transmission Corruption of ACK can induce costly exponential back-off The attacker requires minimum energy for listening

18 Detection, Prevention and Mitigation Errors are detected using checksum mismatch There is no effective way of defending against such an attack Error Correcting codes can be used at the cost of increased overheads

19 Exhaustion Repeated retransmissions are triggered even by unusually late collisions This leads to exhaustion of battery source It can potentially block availability A node could repeatedly request channel access with RTS This causes power losses on both requesting and responding node

20 Detection, Prevention and Mitigation Random back-offs can be used for prevention Ineffective as they would only decrease probability of inadvertent collisions Time division multiplexing Solve the indefinite postponement problem MAC admission control rate limiting Limiting the extraneous responses required

21 Unfairness It is a weaker form of DoS It mostly degrades service than denies it It exploits MAC-Layer priority schemes It can be prevented by use of small frames This may increase framing overheads Adversary can cheat while vying for access

22 Network and Routing Layer Messages may traverse many hops before reaching the destination The cost of relaying a packet and the probability of its loss increases in an aggregate network Every node can act as a router Hence the routing protocols should be simple and robust

23 Neglect and Greed A neglectful node arbitrarily neglects to route some messages Its undue priority to messages originating from it makes it greedy Multiple routes or sending redundant messages can reduce its effect. It is difficult to detect

24 Homing Important nodes and their identities are exposed to mount further attacks A passive adversary observes traffic to learn the presence and location of critical resources Shared cryptographic keys are an effective mechanism to conceal the identity of such nodes This makes the assumption that none of the nodes have been subverted

25 Misdirection Messages are forwarded in wrong paths This attack targets the sender Adversary can forge replies to route discovery requests and include the spoofed route Sensor networks can use an approach similar to egress filtering

26 Black Holes Nodes advertise zero cost routes to every other node Network traffic is routed towards these nodes This disrupts message delivery and causes intense resource contention These are easily detected but more disruptive

27 Authorization This is a defense mechanism against misdirection and black-hole Only authorized node can share information Public-key encryption can be used for routing updates The problems are with computational and communication overheads and key management

28 Monitoring Nodes can keep monitoring their neighbors Nodes become watchdogs for transmitted packets Each of them has a quality-rating mechanism

29 Probing A network probe tests network connectivity This mechanism can be used to easily detect Black holes A distributed probing scheme can detect malicious nodes

30 Redundancy Lessens the probability of encountering a malicious node Duplicate messages can also be sent using same path to deal with intermittent failure

31 Transport Layer Manages end-to-end connections Sensor Networks utilize protocols with minimum overhead The potential threats are Flooding Desynchronization

32 Flooding Adversary send many connection establishment request to victim Each request causes allocation of resources It can be prevented by limiting the number of connections Connectionless protocols are not susceptible to this attack Another solution is client puzzles

33 Desynchronization The attacker forges messages to one or both ends with sequence numbers This causes the end points to request retransmissions of missed frames This may lead to lack of availability and resource exhaustion Authentication can prevent such an attack

34 Adaptive rate control Describe a series of improvements to standard MAC protocols Key mechanisms include Random delay for transmissions Back-off that shifts an applications periodicity phase Minimization of overhead in contention control mechanisms Passive adaptation of originating and route-through admission control rates Anticipatory delay for avoiding multihop hidden node problems

35 Conclusion Attempts at adding security focus on cryptographic-authentication mechanisms Use of higher security mechanisms poses serious complications in Sensor Networks It is essential to incorporate security considerations during design-time Without adequate protection against DoS and other attacks sensor networks may not be deployable at all

36 References C.L.Schuba et al., “Analysis of a Denial of Service Attack on TCP”, Proc. IEEE Symp. Security and Privacy, IEEE Press, Piscataway, N.J., 1997, pp A Perrig et al., “SPIN: Security Protocols for Sensor Networks,” Proc. 7 th Ann. Intl. Conf. Mobile Computing and Networking (MobiCom 2001), ACM Press, New York, 2001, pp CERT Coordination Center, “Smurf IP Denial-of-Service Attacks”, CERT Advisory CA-98:01,Jan A. Woo and D.E. Culler, “A Transmission Control Scheme for Media Access in Sensor Networks,” Proc. 7 th Ann Int’l Conf. Mobile Computing and Networking (MobiCom 2001), ACM Press, New York, 2001, pp