Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
EAACK—A Secure Intrusion-Detection System for MANETs
.Sense A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command Screenshots We present.Sense, an end-to-end security framework for.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Security of the Internet of Things: perspectives and challenges
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Security Issues in Wireless Sensor Networks
Majid Alshammari and Khaled Elleithy
An Overview of Security Issues in Sensor Network
Presentation transcript:

Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235

Abstract Wireless sensor networks are a device that can collect data and its size can range from a few hundred sensors to a few hundred thousand or possibly more [1]. As WSNs can be data collection, coordinated analysis, and automated event correlation [2], they can be applied to a wide range of purposes such as temperature monitoring, vehicle monitoring, animal monitoring…etc. These sensors, different from traditional networks, are deployed over our environment and it is more vulnerable to security attacks than wired networks, due to the broadcast communication [3]. Therefore, security issues become extremely important. In this paper, different kinds of threats in WSN are introduced and it indicates that how they can be avoided and protected by security services in WSN.

Outline Section I Introduction Section II Wireless Sensor Networks – What is WSN? – Where can it be used for? Section III Threats and Attacks in Wireless Sensor Networks – Passive Information Gathering – False Node insertion – Sybil Attack – Wormhole Attack Section IV Security Goals in Wireless Sensor Networks – Data Confidentiality – Data authentication – Data Integrity – Data Freshness – Robustness Section V Security Method: LEAP – Individual Key – Group Key – Cluster Key – Pairwise Shared Key Section VI Conclusion

Wireless Sensor Networks From: orNetChap04.pdf

Threats and Attacks (1) Passive Information Gathering Physical location Message Use encryption to prevent it False Node insertion False data Inject False Messages Use authentication to prevent it

Threats and Attacks (2) Sybil Attack

Threats and Attacks (3) Wormhole Attack From:

Security Goals Data Confidentiality Data authentication Data Integrity Data Freshness Robustness

Security Method: LEAP Localized Encryption and Authentication Protocol Four types of keys – Individual key Each node has a unique key shared with the base station – Cluster key A node has the key shared with all of its neighboring nodes – Pairwise key A node has the key shared with its immediate neighbors. – Group key “This is a globally shared key that is used by the base station for encrypting messages that are broadcast to the whole group.”[3]

Reference [1] Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Springer Science + Business Media, LLC, 19 May [2] Adrian Perrig, “John Stankovic, and David Wagner, Security in Wireless Sensor Netoworks,” Communications of The ACM, Vol. 47 No. 6, pp , June [3] Xiuli Ren, “Security Methods for Wireless Sensor Networks,” in International Conference on Mechatronics and Automation, 2006, pp [4] Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu, and Nael Abu-Ghazaleh, An application-Driven Perspective on Wireless Sensor Network Security, [5] F. L. LEWIS, Wireless Sensor Networks,