Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Denial of Service in Sensor Networks Szymon Olesiak.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Routing Security in Ad Hoc Networks
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS541 Advanced Networking 1 A Real-Time Communication Architecture for Wireless Sensor Networks Neil Tang 4/22/2009.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Chapter 4: Managing LAN Traffic
Security in Wireless Sensor Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
C8- Securing Information Systems
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
CSC8320. Outline Content from the book Recent Work Future Work.
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Chapter 2 Network Models
Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chap. 2 Network Models.
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Chapter 3: Open Systems Interconnection (OSI) Model
Security Of Wireless Sensor Networks
Wireless Sensor Networks (WSN’s) Security Lecture 13
Security of Wireless Sensor Networks
An Overview of Security Issues in Sensor Network
Sensor Networks Security
Presentation transcript:

Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic

Why Security? Battlefield Battlefield Disasters Disasters –Protect the location and status of casualties from unauthorized disclosure, particularly if the disaster relates to ongoing terrorist activities Public safety Public safety –False alarms about chemical, biological, or environmental threats could cause panic or disregard for warning systems. An attack on the system’s availability could precede a real attack on the protected resource. Home healthcare Home healthcare –Because protecting privacy is paramount, only authorized users can query or monitor the network. These networks can also form critical pieces of an accident-notification chain, thus they must be protected from failure.

THE DENIAL OF SERVICE THREAT A DoS attack is any event that diminishes or eliminates a network’s capacity to perform its expected function. Hardware failures, software bugs, resource exhaustion, environmental conditions, or their combination Hardware failures, software bugs, resource exhaustion, environmental conditions, or their combination Intentional Attack Intentional Attack

Adversary Capability Physically damaged or manipulated node Physically damaged or manipulated node –May be less powerful than a normally functioning node. Subverted nodes (or added ones) Subverted nodes (or added ones) –Interact with the network only through software –As powerful as other nodes Immensely more powerful adversaries Immensely more powerful adversaries –Existing wired network with virtually unlimited computational and energy resources possible.

Attacks on Physical Layer Jamming Jamming –Defenses Spread-spectrum Spread-spectrum Region mapping Region mapping –Lower duty cycle Tampering Tampering –Defenses: Tamper-proofing, hiding

Link Layer Attacks Collision Collision –Use error-correcting codes Exhaustion Exhaustion –Rate limitation Unfairness Unfairness –Small frames

Network and Routing Attacks Neglect and greed Neglect and greed –Redundancy, probing Homing/traffic analysis Homing/traffic analysis –Encryption: enough? Misdirection Misdirection –Egress filtering, authorization, monitoring Black holes Black holes –Authorization, monitoring, probing, redundancy

Neglect and Greed Neglect Neglect –Drops packets arbitrarily Greed Greed –Gives undue priority to it’s own messages Use multiple paths and/or redundant messages to mitigate these effects. Use multiple paths and/or redundant messages to mitigate these effects.

Homing Geographic forwarding allows attacker to figure out where important nodes are. Geographic forwarding allows attacker to figure out where important nodes are. Encrypting headers as well as content might alleviate this issue. Encrypting headers as well as content might alleviate this issue.

Misdirection Diverting traffic away from intended destination Diverting traffic away from intended destination – targets the sender Misdirecting many flows in one direction Misdirecting many flows in one direction – targets an arbitrary victim (receiver) Defense Defense –Egress Filtering Verification of source addresses Verification of source addresses Legitimately generated from below? Legitimately generated from below?

Black Holes Distance-vector-based protocol weakness Distance-vector-based protocol weakness Nodes advertise zero-cost routes to every other node. Nodes advertise zero-cost routes to every other node. Fixes: Fixes: –Authorization –Monitoring watchdog the next hop transmission of your packets by neighbors watchdog the next hop transmission of your packets by neighbors –Probing Send periodic messages across topology to test for blackout regions Send periodic messages across topology to test for blackout regions –Redundancy

Transport Layer DoS Flooding Flooding –Client puzzles Make the adversary commit resources Make the adversary commit resources Only useful if the adversary has limited resources Only useful if the adversary has limited resources Desynchronization Desynchronization –Authentication

PROTOCOL VULNERABILITIES Analyzing these vulnerabilities helps show why developers should consider DoS susceptibility at design time.

Adaptive Rate Control – MAC Protocol by Woo & Cull Give preference to route-through traffic Give preference to route-through traffic –This preserves the network’s investment in packets that may have already traversed many hops. Makes flooding attacks more effective. Makes flooding attacks more effective. –High bandwidth packet streams that an adversary generates will receive preference during collisions that can occur at every hop along their route. –Thus, the network gives preference to malicious traffic.

RAP Real-time communication architecture Real-time communication architecture –query-event service API –geographic forwarding –Velocity monotonic scheduling (VMS) policy. Originator of message sets deadline, and destination Originator of message sets deadline, and destination –VMS layer computes velocity based on time to deadline and distance remaining

RAP Vulnerability Flood with high velocity packets Flood with high velocity packets –Set destination at long distance Possibly outside the network Possibly outside the network Intermediate node adversary could lower the velocity of route through traffic Intermediate node adversary could lower the velocity of route through traffic –Causes missed deadline several hops away If relying on a synchronized clock, attacking that mechanism could cause another node to always drop If relying on a synchronized clock, attacking that mechanism could cause another node to always drop –inadvertent black hole