Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.
SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Szymon Olesiak.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Wireless Sensor Network. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to.
Resilience To Jamming Attacks
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Wireless Sensor Networks Smart Environments: Technologies, Protocols, and Applications ed. D.J. Cook and S.K. Das, John Wiley, New York, B.Devi
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Fault Tolerance in ZigBee Wireless Sensor Networks
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
UnderWater Acoustic Sensor Networks (UW-ASN) -Xiong Junjie
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University Network/Computer Security.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Introduction to Wireless Sensor Networks
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Cognitive Radio Networks
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Cognitive Radio: Next Generation Communication System
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
IEEE Wireless LAN Standard
M. R. Kharazmi Chapter 1 Data Communications and Networks Overview.
Jamming for good: a fresh approach to authentic communication in WSNs
Supervisor: Dr. Ian Wassell
Net301 lecture9 11/5/2015 Lect 9 NET301.
Wireless LAN Security 4.3 Wireless LAN Security.
Cognitive Radio Networks
The Medium Access Control Sublayer
Wireless LAN Simulation IEEE MAC Protocol
Denial-of-Service Jammer Detector Training Course Worldsensing
DK presents Division of Computer Science, KAIST
An Overview of Security Issues in Sensor Network
Presentation transcript:

Network security Dr.Andrew Yang

 A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations[1]

 Ease of installation,  Self-identification, self-diagnosis,  Reliability, time awareness for coordination with other nodes  A smart sensor is a sensor that provides extra functions beyond those necessary for generating a correct representation of the sensed quantity

 The wireless sensor network is susceptible to many attacks and so the simple cryptographic methods cannot be used.  One such kind of an attack is denial of service attack where the adversaries observe the communication and send false messages so that wireless devices could not communicate.

 control frames can be used to "busy out" a channel so that no other station can transmit. Entering this continuous transmit mode is known as a Queensland DoS attack.  deauthenticate frames can be used to disconnect an individual station, or every station. Sending a continuous stream of these forged frames is known as a Deauth Flood.  Similar attacks can be launched using forged 802.1X packets -- for example, 802.1X EAP Logoff Flood, EAP Start Flood, and EAP-of-Death attacks.[2]

 As the b/g uses the crowded 2.4ghz band it is susceptible to interference from other radio waves is common like Bluetooth, cordless phones etc.

 Use a WIDS to spot the appearance new devices that transmit on the bands and channels used by your WLAN.  Use WIDS alerts to flag over-loaded channel or excessive error or retransmission rates (possible non interference).  For non interference sources, use a spectrum analyzer to monitor transmissions and fingerprint the type of device you should be looking for.  Track down interference sources by using a WIDS to plot an approximate location. Then use a mobile tool to search that area and isolate the device's location [2]

 Unlike traditional denial of service attacks, which are concerned with filling user domain and kernel domain buffers, jamming attacks exploit the shared nature of the wireless medium in order to prevent devices from communicating or receiving

 Constant Jammer: continually emits a radio signal, and can be implemented using either a wave form generator that continuously sends a radio signal.  Usually, the underlying MAC protocol allows legitimate nodes to send out packets only if the channel is idle. Thus, a constant jammer can effectively prevent legitimate traffic sources from getting hold of a channel and sending packets

 It constantly injects regular packets to the channel without any gap between subsequent packet transmissions the normal communicator will be deceived into believing there is a legitimate packet and be duped to remain in the receive state. For example, in TinyOS, if a preamble is detected, a node remains in the receive mode, regardless of whether that node has a packet to send or not. Even if a node has packets to send, it cannot switch to the send state because a constant stream of incoming packets will be detected.

 It doesn’t continuously try to jam it sleeps for some time and then it tries to jam when it is not in sleeping mode.  During its jamming phase it can either behave as a constant or a deceptive jammer.  This kind of attack is launched by an adversary who doesn’t have unlimited power supply.

 The other three work irrespective of the traffic on the channel where as this jammer doesn’t do anything when the channel is idle but starts transmitting as soon as it detect an activity on the channel.  This kind of jamming is hard to detect.

 The first strategy involves avoiding the jammer in either the spectral or spatial sense, and can be achieved by changing channel allocations or, in mobile sensor networks, by moving nodes away from the jammer.  The second strategy involves competing with the jammer by adjusting the transmission power levels and employing error correction in order to have more resilience against jamming

[1] r_Networks [2] c/0,295582,sid14_gci ,00.html